Lookup for vulnerable packages by Package URL.

GET /api/packages/73680?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/73680?format=api",
    "purl": "pkg:ebuild/app-emulation/vmware-server@6.5.5.328052",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "vmware-server",
    "version": "6.5.5.328052",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34290?format=api",
            "vulnerability_id": "VCID-2a5v-kuuc-7uaa",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85429",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85449",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85453",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85473",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85482",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85496",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85494",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02551",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85491",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2267"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt",
                    "reference_id": "CVE-2009-2267;OSVDB-59441",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/10207.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-2267"
            ],
            "risk_score": null,
            "exploitability": "2.0",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a5v-kuuc-7uaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34274?format=api",
            "vulnerability_id": "VCID-2kj7-a6r9-bfft",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=715"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88137",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88079",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88103",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88109",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88128",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88134",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03824",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88136",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30600"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30740"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30819"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31479"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31577"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31707"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31709"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31712"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020238"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2608"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9321"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29640"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-643-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-643-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1794"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1876/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2423"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450768",
                    "reference_id": "450768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841",
                    "reference_id": "485841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1806",
                    "reference_id": "CVE-2008-1806",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1806"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200806-10",
                    "reference_id": "GLSA-200806-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200806-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556",
                    "reference_id": "RHSA-2008:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558",
                    "reference_id": "RHSA-2008:0558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0558"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/643-1/",
                    "reference_id": "USN-643-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/643-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1806"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2kj7-a6r9-bfft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34261?format=api",
            "vulnerability_id": "VCID-2nvs-t3tu-6qb5",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92088",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92095",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92102",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92106",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92118",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92125",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5269"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=324771",
                    "reference_id": "324771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=324771"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200711-08",
                    "reference_id": "GLSA-200711-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200711-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201412-11",
                    "reference_id": "GLSA-201412-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201412-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0992",
                    "reference_id": "RHSA-2007:0992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0992"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/538-1/",
                    "reference_id": "USN-538-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/538-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/730-1/",
                    "reference_id": "USN-730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-5269"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nvs-t3tu-6qb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34268?format=api",
            "vulnerability_id": "VCID-2yer-rsfy-h3c2",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1340",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76246",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76249",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7628",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7626",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76306",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76333",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76311",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1340"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1340"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2yer-rsfy-h3c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34262?format=api",
            "vulnerability_id": "VCID-63ya-au98-hkes",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5503.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5503.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93183",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93192",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93197",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93194",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93203",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93212",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93211",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5503"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=387431",
                    "reference_id": "387431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=387431"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200712-04",
                    "reference_id": "GLSA-200712-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200712-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:1078",
                    "reference_id": "RHSA-2007:1078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:1078"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/550-1/",
                    "reference_id": "USN-550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/550-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-5503"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-63ya-au98-hkes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34270?format=api",
            "vulnerability_id": "VCID-7yq2-17us-5kdd",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10126",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10248",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10313",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10213",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10286",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10348",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10378",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10337",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10315",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1362"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1362"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7yq2-17us-5kdd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31420?format=api",
            "vulnerability_id": "VCID-8fbf-8fea-27d9",
            "summary": "Two vulnerabilities in dnsmasq might allow for a Denial of Service or\n    spoofing of DNS replies.",
            "references": [
                {
                    "reference_url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-009.txt.asc"
                },
                {
                    "reference_url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html"
                },
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
                },
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01523520"
                },
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01662368"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00005.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=121630706004256&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=121630706004256&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=121866517322103&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=121866517322103&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=123324863916385&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=123324863916385&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=141879471518471&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=141879471518471&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2008-0533.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1447.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99423",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99416",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99418",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99419",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.86697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9942",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447"
                },
                {
                    "reference_url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-037"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30925"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30973"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30977"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30979"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30980",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30980"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30988"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30989",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30989"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30998"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31011"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31012"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31014"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31019"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31022"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31030"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31033"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31052"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31065"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31072"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31093"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31094"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31137"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31143"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31151"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31152"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31153"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31169"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31197"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31199"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31204"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31207"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31209"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31212"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31213"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31221"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31236"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31237"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31254"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31326"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31354",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31354"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31422"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31430"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31451"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31482"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31495"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31588"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31687"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31882"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33178"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33714"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33786"
                },
                {
                    "reference_url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:06.bind.asc"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200807-08.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200807-08.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200812-17.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43334"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43637"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.452680"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.539239"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12117"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5725"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5761"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5917"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9627"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239392-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240048-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.citrix.com/article/CTX117991",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.citrix.com/article/CTX117991"
                },
                {
                    "reference_url": "http://support.citrix.com/article/CTX118183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.citrix.com/article/CTX118183"
                },
                {
                    "reference_url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=762152"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6122"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6123"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/6130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/6130"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00402.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00458.html"
                },
                {
                    "reference_url": "https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
                },
                {
                    "reference_url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://up2date.astaro.com/2008/08/up2date_7202_released.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0231"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018"
                },
                {
                    "reference_url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.bluecoat.com/support/security-advisories/dns_cache_poisoning"
                },
                {
                    "reference_url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.caughq.org/exploits/CAU-EX-2008-0002.txt"
                },
                {
                    "reference_url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.caughq.org/exploits/CAU-EX-2008-0003.txt"
                },
                {
                    "reference_url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1603"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1604"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1605"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1619"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2008/dsa-1623"
                },
                {
                    "reference_url": "http://www.doxpara.com/DMK_BO2K8.ppt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.doxpara.com/DMK_BO2K8.ppt"
                },
                {
                    "reference_url": "http://www.doxpara.com/?p=1176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.doxpara.com/?p=1176"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26667"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26668"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26669"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26670"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26671"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ26672"
                },
                {
                    "reference_url": "http://www.ipcop.org/index.php?name=News&file=article&sid=40",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ipcop.org/index.php?name=News&file=article&sid=40"
                },
                {
                    "reference_url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.isc.org/index.pl?/sw/bind/bind-security.php"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/800113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/800113"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/MIMG-7DWR4J"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/MIMG-7ECL8Q"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:139"
                },
                {
                    "reference_url": "http://www.nominum.com/asset_upload_file741_2661.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.nominum.com/asset_upload_file741_2661.pdf"
                },
                {
                    "reference_url": "http://www.novell.com/support/viewContent.do?externalId=7000912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/support/viewContent.do?externalId=7000912"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata42.html#013_bind",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata42.html#013_bind"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata43.html#004_bind",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata43.html#004_bind"
                },
                {
                    "reference_url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.phys.uu.nl/~rombouts/pdnsd/ChangeLog"
                },
                {
                    "reference_url": "http://www.phys.uu.nl/~rombouts/pdnsd.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.phys.uu.nl/~rombouts/pdnsd.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0789.html"
                },
                {
                    "reference_url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU800113.html"
                },
                {
                    "reference_url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495289/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30131"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020437"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020438"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020440"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020448"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020449"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020548"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020558"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020560"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020561",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020561"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020575"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020576"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020577"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020578"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020579"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020651"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020653"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020702",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020702"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020802"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020804"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-622-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-622-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-627-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-627-1"
                },
                {
                    "reference_url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA08-190A.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA08-190B.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA08-260A.html"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2019/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2019/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2023/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2023/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2025/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2025/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2029/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2029/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2030/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2030/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2050/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2050/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2051/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2051/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2052/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2052/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2055/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2055/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2092/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2092/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2113/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2113/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2114/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2114/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2123/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2123/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2139/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2139/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2166/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2166/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2195/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2195/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2196/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2196/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2197/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2197/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2268"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2291"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2334"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2342"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2377",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2377"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2383"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2384",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2384"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2467"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2482"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2549"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2582"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2584",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2584"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0297"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0311"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/0622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/0622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345",
                    "reference_id": "449345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449345"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123",
                    "reference_id": "490123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=490123"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465",
                    "reference_id": "492465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492465"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698",
                    "reference_id": "492698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492698"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700",
                    "reference_id": "492700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=492700"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599",
                    "reference_id": "493599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493599"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:compute_cluster:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:datacenter:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:enterprise:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:standard:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:storage:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447",
                    "reference_id": "CVE-2008-1447",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1447"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200807-08",
                    "reference_id": "GLSA-200807-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200807-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200809-02",
                    "reference_id": "GLSA-200809-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200809-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200812-17",
                    "reference_id": "GLSA-200812-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200812-17"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200901-03",
                    "reference_id": "GLSA-200901-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200901-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb",
                    "reference_id": "OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6122.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py",
                    "reference_id": "OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6123.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c",
                    "reference_id": "OSVDB-48245;CVE-2008-4194;OSVDB-47927;CVE-2008-1447;OSVDB-47926;OSVDB-47916;OSVDB-47232;OSVDB-46776",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/6130.c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0533",
                    "reference_id": "RHSA-2008:0533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0789",
                    "reference_id": "RHSA-2008:0789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0789"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/622-1/",
                    "reference_id": "USN-622-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/622-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/627-1/",
                    "reference_id": "USN-627-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/627-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1447"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fbf-8fea-27d9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34284?format=api",
            "vulnerability_id": "VCID-9enb-qxzr-zka6",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://kb.vmware.com/kb/1006980",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kb.vmware.com/kb/1006980"
                },
                {
                    "reference_url": "http://kb.vmware.com/kb/1006986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kb.vmware.com/kb/1006986"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4917",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22193",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22152",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2231",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22138",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22221",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22275",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22295",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22253",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4917"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32965"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1021300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1021300"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1021301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1021301"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6246"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/498863/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/498863/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/498886/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/498886/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/32597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/32597"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4917",
                    "reference_id": "CVE-2008-4917",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4917"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-4917"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9enb-qxzr-zka6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34294?format=api",
            "vulnerability_id": "VCID-a1zy-wpsh-ybdq",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/bugtraq/2010-04/0077.html"
                },
                {
                    "reference_url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0121.html"
                },
                {
                    "reference_url": "http://freetexthost.com/qr1tffkzpu",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://freetexthost.com/qr1tffkzpu"
                },
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2010/000090.html"
                },
                {
                    "reference_url": "http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://pocoftheday.blogspot.com/2009/10/vmware-server-20x-remote-dos-exploit.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7957",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79521",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79527",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79549",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79536",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79578",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4811"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/36630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/36630"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2010-0007.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:7.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4811",
                    "reference_id": "CVE-2009-4811",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4811"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-4811"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a1zy-wpsh-ybdq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34299?format=api",
            "vulnerability_id": "VCID-b7yt-1bj3-13bp",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22497",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22715",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22584",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22656",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22615",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22559",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1139"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1139"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7yt-1bj3-13bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34272?format=api",
            "vulnerability_id": "VCID-bz18-eys5-rua3",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1364.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1364.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82736",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82749",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82746",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82773",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82795",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82791",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82786",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1364"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1364"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz18-eys5-rua3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34271?format=api",
            "vulnerability_id": "VCID-d1tn-aydm-7ucp",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13347",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13449",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13514",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13308",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1339",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13412",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13378",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1333",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1363"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1363"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d1tn-aydm-7ucp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34287?format=api",
            "vulnerability_id": "VCID-dc32-wm2e-h7fj",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89006",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88951",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88959",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88978",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89001",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89013",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89008",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0910"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5786"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/34373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/34373"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021974"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0944"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0910",
                    "reference_id": "CVE-2009-0910",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0910"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-0910"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dc32-wm2e-h7fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34265?format=api",
            "vulnerability_id": "VCID-e5gp-hpdc-nydk",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=713"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21877",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21849",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21906",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21961",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21974",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21934",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30556"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/3922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/3922"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020198"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42878"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4768"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5583"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29557",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29557"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1744"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0967",
                    "reference_id": "CVE-2008-0967",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0967"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0967"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5gp-hpdc-nydk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34298?format=api",
            "vulnerability_id": "VCID-eyg9-ezua-1kfz",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73446",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73454",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73477",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73448",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73485",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73499",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73522",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73503",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73496",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1138"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1138"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eyg9-ezua-1kfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34301?format=api",
            "vulnerability_id": "VCID-gdac-gvg7-m3e9",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9014",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90143",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90159",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90175",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90189",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90188",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90183",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1141"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1141"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdac-gvg7-m3e9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34302?format=api",
            "vulnerability_id": "VCID-ke4g-w7md-pkh6",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78066",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78075",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78104",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78117",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78125",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78121",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1142"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1142"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ke4g-w7md-pkh6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34289?format=api",
            "vulnerability_id": "VCID-kxd4-h9ev-1yby",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70285",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70302",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70279",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70324",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70339",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70363",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70334",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1244"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-1244"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxd4-h9ev-1yby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34303?format=api",
            "vulnerability_id": "VCID-njd2-w4zv-h3er",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2010/000092.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2010/000092.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81052",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80989",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80998",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81021",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8102",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81054",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81072",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81059",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1143"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1023945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1023945"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16298",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16298"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/39949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/39949"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2010-0008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2010-0008.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:view_manager:3.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/12610.txt",
                    "reference_id": "CVE-2010-1143",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/12610.txt"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1143",
                    "reference_id": "CVE-2010-1143",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1143"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33940.txt",
                    "reference_id": "CVE-2010-1143;OSVDB-64440",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33940.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/39949/info",
                    "reference_id": "CVE-2010-1143;OSVDB-64440",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/39949/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1143"
            ],
            "risk_score": 7.8,
            "exploitability": "2.0",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njd2-w4zv-h3er"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34285?format=api",
            "vulnerability_id": "VCID-pw1x-gvns-bbcx",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt"
                },
                {
                    "reference_url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html"
                },
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92242",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92209",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92245",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92246",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92222",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92225",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92239",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0040"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33970"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33976"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34137"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34140",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34140"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34143"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34145",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34145"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34152"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34210"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34265",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34265"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34272"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34320"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34324"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34388"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34462"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34464",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34464"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35074"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35258"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35302"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35379"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35386"
                },
                {
                    "reference_url": "http://secunia.com/advisories/36096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/36096"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200903-28.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952"
                },
                {
                    "reference_url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3549"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3613"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3639"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3757"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm"
                },
                {
                    "reference_url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046"
                },
                {
                    "reference_url": "http://www.debian.org/security/2009/dsa-1750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2009/dsa-1750"
                },
                {
                    "reference_url": "http://www.debian.org/security/2009/dsa-1830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2009/dsa-1830"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/649212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/649212"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/33827",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/33827"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/33990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/33990"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0469"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0473"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0632"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1297"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1451"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1462"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1522"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1560"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1621"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/2172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/2172"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355",
                    "reference_id": "486355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040",
                    "reference_id": "CVE-2009-0040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040",
                    "reference_id": "CVE-2009-0040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200903-28",
                    "reference_id": "GLSA-200903-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200903-28"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201412-08",
                    "reference_id": "GLSA-201412-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201412-08"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-10",
                    "reference_id": "mfsa2009-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0315",
                    "reference_id": "RHSA-2009:0315",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0315"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0325",
                    "reference_id": "RHSA-2009:0325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0333",
                    "reference_id": "RHSA-2009:0333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0333"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0340",
                    "reference_id": "RHSA-2009:0340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0340"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/728-1/",
                    "reference_id": "USN-728-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/728-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/730-1/",
                    "reference_id": "USN-730-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/730-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-0040"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pw1x-gvns-bbcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34283?format=api",
            "vulnerability_id": "VCID-q5ts-6ax2-bqgb",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11335",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11318",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11458",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11431",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4916"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6439"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/34373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/34373"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021973",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021973"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0944"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:emc:vmware_player:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:1.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_ace:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esx:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_esxi:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.01:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.05:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.05:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:4.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.0.45731:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.03:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.4:build_93057:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:6.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4916",
                    "reference_id": "CVE-2008-4916",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4916"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-4916"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ts-6ax2-bqgb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34286?format=api",
            "vulnerability_id": "VCID-r2aq-6u1w-dubh",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2009/000054.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88347",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88292",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.883",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88315",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88319",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88339",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88355",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0909"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2009/Apr/0036.html"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6251"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/34373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/34373"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021974"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2009-0005.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0944"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:6.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0909",
                    "reference_id": "CVE-2009-0909",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0909"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-0909"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r2aq-6u1w-dubh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34269?format=api",
            "vulnerability_id": "VCID-r4en-2px9-pkcw",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12351",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12459",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12502",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12307",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12386",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12443",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12404",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12364",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1361"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1361"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4en-2px9-pkcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34291?format=api",
            "vulnerability_id": "VCID-r55y-rbsq-pkb9",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95642",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95651",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95657",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9566",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95668",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95677",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95676",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.21257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95678",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3707"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/33271.py",
                    "reference_id": "CVE-2009-3707;OSVDB-58728",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/33271.py"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/36630/info",
                    "reference_id": "CVE-2009-3707;OSVDB-58728",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/36630/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3707"
            ],
            "risk_score": 0.4,
            "exploitability": "2.0",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r55y-rbsq-pkb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34278?format=api",
            "vulnerability_id": "VCID-rcck-xn4c-k3at",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85637",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85565",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85577",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85594",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8562",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85644",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85641",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30600"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30740"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30819"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31479"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31577"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31707"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31709"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31712"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35204"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020240"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2608"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0329.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29637"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29639"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-643-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-643-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1794"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1876/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2423"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774",
                    "reference_id": "450774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450774"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841",
                    "reference_id": "485841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808",
                    "reference_id": "CVE-2008-1808",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1808"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200806-10",
                    "reference_id": "GLSA-200806-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200806-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556",
                    "reference_id": "RHSA-2008:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558",
                    "reference_id": "RHSA-2008:0558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329",
                    "reference_id": "RHSA-2009:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0329"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/643-1/",
                    "reference_id": "USN-643-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/643-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1808"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34280?format=api",
            "vulnerability_id": "VCID-rpue-d1na-gkaa",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35941",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35871",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36061",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36091",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35925",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35998",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36004",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00153",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35965",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2100"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30556"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/3922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/3922"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020200"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42872"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5081"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5647"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29552"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1744"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2100",
                    "reference_id": "CVE-2008-2100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2100"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2100"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rpue-d1na-gkaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34300?format=api",
            "vulnerability_id": "VCID-rzpn-qmzx-w3gt",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1140",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25595",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25667",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25708",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25476",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25608",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25566",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2551",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1140"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1140"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzpn-qmzx-w3gt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34293?format=api",
            "vulnerability_id": "VCID-sz64-mgub-abf2",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.9006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9958",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.9006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99581",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.9006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99582",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.9006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99583",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.9006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99584",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3733"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33310.nse",
                    "reference_id": "CVE-2009-3733;OSVDB-59440",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33310.nse"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/36842/info",
                    "reference_id": "CVE-2009-3733;OSVDB-59440",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/36842/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3733"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sz64-mgub-abf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34273?format=api",
            "vulnerability_id": "VCID-tawd-pjmt-ukag",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73181",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73176",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73212",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73226",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73251",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73232",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00754",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73225",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1392"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tawd-pjmt-ukag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34276?format=api",
            "vulnerability_id": "VCID-txkg-jsdf-93e6",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=716"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90055",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90013",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90016",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90027",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90062",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05336",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9006",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30600"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30740"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30766"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30819"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30821"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31479"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31577"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31707"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31709",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31709"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31711"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31712"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31823"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31856"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31900",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31900"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200806-10.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200806-10.xml"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020239"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-2608"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9767"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3026"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3129"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:121"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0556.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0558.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495497/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/29641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/29641"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-643-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-643-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player2/doc/releasenotes_player2.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/player/doc/releasenotes_player.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/player/doc/releasenotes_player.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/server/doc/releasenotes_server.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/server/doc/releasenotes_server.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html"
                },
                {
                    "reference_url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1794"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1876/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1876/references"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2423"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2525"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=450773",
                    "reference_id": "450773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=450773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841",
                    "reference_id": "485841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1807",
                    "reference_id": "CVE-2008-1807",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1807"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200806-10",
                    "reference_id": "GLSA-200806-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200806-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0556",
                    "reference_id": "RHSA-2008:0556",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0556"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0558",
                    "reference_id": "RHSA-2008:0558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0558"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/643-1/",
                    "reference_id": "USN-643-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/643-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-1807"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txkg-jsdf-93e6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34279?format=api",
            "vulnerability_id": "VCID-uw16-r5d8-nfbu",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27634",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27674",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27711",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27501",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27612",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27617",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27573",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27516",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2098"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2098"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uw16-r5d8-nfbu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34297?format=api",
            "vulnerability_id": "VCID-wknw-5jfy-c3dh",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1137",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71709",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71715",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71747",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71759",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71766",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71749",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1137"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2010-1137"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wknw-5jfy-c3dh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34292?format=api",
            "vulnerability_id": "VCID-x226-fmea-gqhh",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96628",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96643",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96647",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96655",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96656",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96659",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.30069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96662",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3732"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/12188.txt",
                    "reference_id": "CVE-2009-3732;OSVDB-63605",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/12188.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3732"
            ],
            "risk_score": 0.6,
            "exploitability": "2.0",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x226-fmea-gqhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34281?format=api",
            "vulnerability_id": "VCID-xscf-xy4a-huce",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1922",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19255",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19261",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19214",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2101"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31713"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/4202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/4202"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020794"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44797"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/495869/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30937"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0014.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2466"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2101",
                    "reference_id": "CVE-2008-2101",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2101"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-2101"
            ],
            "risk_score": 0.9,
            "exploitability": "0.5",
            "weighted_severity": "1.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xscf-xy4a-huce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34263?format=api",
            "vulnerability_id": "VCID-xwej-smtp-sfef",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=712"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30275",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30387",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30417",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30462",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30271",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30364",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30367",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30323",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5671"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30556"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/3922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/3922"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020197"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5358"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5688"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493080/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493148/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493148/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/493172/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/493172/100/0/threaded"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0009.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/1744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/1744"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx_server:2.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:5.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5671",
                    "reference_id": "CVE-2007-5671",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5671"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2007-5671"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwej-smtp-sfef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34304?format=api",
            "vulnerability_id": "VCID-y97g-phmz-rubu",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95334",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95349",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95354",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.22333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95808",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.22333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95811",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.22333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95815",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.22333",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95817",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3868"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2011-3868"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y97g-phmz-rubu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34282?format=api",
            "vulnerability_id": "VCID-z8f9-7v4h-5kfw",
            "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2008/000042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2008/000042.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22166",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22326",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22111",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22194",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22248",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22268",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22226",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4915"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32612"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32624"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46415"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6309"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/498138/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/498138/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/32168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/32168"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021154"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2008-0018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2008-0018.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/3052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/3052"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esx:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:esxi:3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4915",
                    "reference_id": "CVE-2008-4915",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4915"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-25",
                    "reference_id": "GLSA-201209-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-25"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-4915"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z8f9-7v4h-5kfw"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/vmware-server@6.5.5.328052"
}