Lookup for vulnerable packages by Package URL.

GET /api/packages/85727?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
    "type": "ebuild",
    "namespace": "sys-libs",
    "name": "glibc",
    "version": "2.19-r1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.21-r2",
    "latest_non_vulnerable_version": "2.41-r5",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54361?format=api",
            "vulnerability_id": "VCID-1971-5hzf-43dt",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81993",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81888",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81899",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81922",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81918",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81945",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81952",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81972",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81961",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81991",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jun/18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2019/Jun/18"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Sep/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2019/Sep/7"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/93784"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://seclists.org/bugtraq/2019/Jun/14"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Sep/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://seclists.org/bugtraq/2019/Sep/7"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=17048"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:152"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/68006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/68006"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263",
                    "reference_id": "1109263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109263"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774",
                    "reference_id": "751774",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4043",
                    "reference_id": "CVE-2014-4043",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4043"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2306-1/",
                    "reference_id": "USN-2306-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2306-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2014-4043"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61763?format=api",
            "vulnerability_id": "VCID-22vv-9xn4-vyap",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6952",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69546",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69525",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69575",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69592",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69614",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69599",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69585",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69624",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00604",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69633",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3404"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473",
                    "reference_id": "681473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833703",
                    "reference_id": "833703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833703"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098",
                    "reference_id": "RHSA-2012:1098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200",
                    "reference_id": "RHSA-2012:1200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1200"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1589-1/",
                    "reference_id": "USN-1589-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1589-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-3404"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61767?format=api",
            "vulnerability_id": "VCID-42jj-9jmf-s3h5",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6964",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69668",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69645",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69696",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69713",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69735",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6972",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69707",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69747",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69756",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69737",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4424"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423",
                    "reference_id": "689423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=858238",
                    "reference_id": "858238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858238"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1991-1/",
                    "reference_id": "USN-1991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-4424"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61766?format=api",
            "vulnerability_id": "VCID-byqx-z785-6qcq",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95243",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95258",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95262",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9527",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95272",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95277",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95278",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95289",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95293",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.18703",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95296",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4412"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530",
                    "reference_id": "687530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=855385",
                    "reference_id": "855385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855385"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c",
                    "reference_id": "CVE-2012-4412;OSVDB-98142",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/55462/info",
                    "reference_id": "CVE-2012-4412;OSVDB-98142",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/55462/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1991-1/",
                    "reference_id": "USN-1991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-4412"
            ],
            "risk_score": 0.4,
            "exploitability": "2.0",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54412?format=api",
            "vulnerability_id": "VCID-e9fg-s2r5-qfc2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79001",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7893",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78936",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78964",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78948",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78972",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78978",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79002",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78987",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78976",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79004",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=14134"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3142"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/08/29/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/08/29/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/02/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/09/02/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/69472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/69472"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2432-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2432-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135840",
                    "reference_id": "1135840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1135840"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6656",
                    "reference_id": "CVE-2012-6656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6656"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2432-1/",
                    "reference_id": "USN-2432-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2432-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-6656"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=api",
            "vulnerability_id": "VCID-hkyd-8rrg-v3e7",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75132",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75135",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75142",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75188",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75209",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75187",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75213",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75208",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3406"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888",
                    "reference_id": "681888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943",
                    "reference_id": "826943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826943"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1097",
                    "reference_id": "RHSA-2012:1097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1097"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098",
                    "reference_id": "RHSA-2012:1098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200",
                    "reference_id": "RHSA-2012:1200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1200"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1589-1/",
                    "reference_id": "USN-1589-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1589-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-3406"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61770?format=api",
            "vulnerability_id": "VCID-kpcn-f4dw-97hm",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21653",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21651",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21822",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21874",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21627",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21703",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2176",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21771",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21732",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21675",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21683",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544",
                    "reference_id": "717544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408",
                    "reference_id": "976408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976408"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2985-1/",
                    "reference_id": "USN-2985-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2985-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-2207"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54415?format=api",
            "vulnerability_id": "VCID-mt93-6b2q-1faf",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.8487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99349",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.8487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99347",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.8487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9935",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.86662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9942",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.86662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99416",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.86662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.86662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99417",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.86966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99432",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.86966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99431",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.86966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9943",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0235"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461",
                    "reference_id": "1183461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183461"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py",
                    "reference_id": "CVE-2015-0235;OSVDB-117579",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb",
                    "reference_id": "CVE-2015-0235;OSVDB-117579",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb"
                },
                {
                    "reference_url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
                    "reference_id": "CVE-2015-0235;OSVDB-117579",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0090",
                    "reference_id": "RHSA-2015:0090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0090"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0092",
                    "reference_id": "RHSA-2015:0092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0092"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0099",
                    "reference_id": "RHSA-2015:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0101",
                    "reference_id": "RHSA-2015:0101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0126",
                    "reference_id": "RHSA-2015:0126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2485-1/",
                    "reference_id": "USN-2485-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2485-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2015-0235"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61774?format=api",
            "vulnerability_id": "VCID-nrvz-y7zn-6bgu",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91799",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91804",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91813",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91825",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91832",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91835",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91837",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91833",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91853",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9185",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178",
                    "reference_id": "717178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=985625",
                    "reference_id": "985625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=985625"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c",
                    "reference_id": "CVE-2013-4788;OSVDB-95392",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-4788"
            ],
            "risk_score": 0.2,
            "exploitability": "2.0",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61765?format=api",
            "vulnerability_id": "VCID-rp43-q42n-jkh5",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html"
                },
                {
                    "reference_url": "http://osvdb.org/84710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/84710"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1207.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1208.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1262.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1325.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42316",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42307",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42381",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42411",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4235",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42407",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42393",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42364",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42413",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42388",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50201"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50422"
                },
                {
                    "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=14459"
                },
                {
                    "reference_url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/13/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/08/13/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/13/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/08/13/6"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/54982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/54982"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027374"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1589-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1589-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715",
                    "reference_id": "847715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847715"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480",
                    "reference_id": "CVE-2012-3480",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3480"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c",
                    "reference_id": "CVE-2012-3480;OSVDB-84710",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/54982/info",
                    "reference_id": "CVE-2012-3480;OSVDB-84710",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/54982/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1207",
                    "reference_id": "RHSA-2012:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1208",
                    "reference_id": "RHSA-2012:1208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1325",
                    "reference_id": "RHSA-2012:1325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1325"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1589-1/",
                    "reference_id": "USN-1589-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1589-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1589-2/",
                    "reference_id": "USN-1589-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1589-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-3480"
            ],
            "risk_score": 8.2,
            "exploitability": "2.0",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61764?format=api",
            "vulnerability_id": "VCID-skgp-p9xp-k3cf",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3405",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71191",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71192",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71234",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71249",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71256",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7124",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71287",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71293",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00666",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7127",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3405"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473",
                    "reference_id": "681473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=833704",
                    "reference_id": "833704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833704"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1098",
                    "reference_id": "RHSA-2012:1098",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1098"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1200",
                    "reference_id": "RHSA-2012:1200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1200"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1589-1/",
                    "reference_id": "USN-1589-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1589-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2012-3405"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61769?format=api",
            "vulnerability_id": "VCID-tdxd-r347-3yex",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8683",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86827",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86831",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87403",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8741",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87417",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87384",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1914"
                },
                {
                    "reference_url": "https://bugzilla.novell.com/show_bug.cgi?id=813121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.novell.com/show_bug.cgi?id=813121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/fulldisclosure/2021/Sep/0"
                },
                {
                    "reference_url": "http://secunia.com/advisories/52817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/52817"
                },
                {
                    "reference_url": "http://secunia.com/advisories/55113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/55113"
                },
                {
                    "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15330"
                },
                {
                    "reference_url": "http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/03/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/04/03/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/03/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/04/03/8"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/04/05/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/04/05/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/58839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/58839"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1991-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1991-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623",
                    "reference_id": "704623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=947882",
                    "reference_id": "947882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=947882"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1914",
                    "reference_id": "CVE-2013-1914",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1914"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0769",
                    "reference_id": "RHSA-2013:0769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605",
                    "reference_id": "RHSA-2013:1605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1605"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1991-1/",
                    "reference_id": "USN-1991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-1914"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61773?format=api",
            "vulnerability_id": "VCID-w1zk-1c5m-3fb2",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78873",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78879",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78908",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78914",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7892",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78944",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78929",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78948",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78945",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280",
                    "reference_id": "1022280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1022280"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181",
                    "reference_id": "727181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391",
                    "reference_id": "RHSA-2014:1391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1391"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2306-1/",
                    "reference_id": "USN-2306-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2306-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-4458"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61772?format=api",
            "vulnerability_id": "VCID-ydrg-f673-53gv",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81904",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81915",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81938",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81961",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81968",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81988",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82007",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01645",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82009",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007545",
                    "reference_id": "1007545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007545"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536",
                    "reference_id": "722536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1411",
                    "reference_id": "RHSA-2013:1411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605",
                    "reference_id": "RHSA-2013:1605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1605"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1991-1/",
                    "reference_id": "USN-1991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-4332"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61771?format=api",
            "vulnerability_id": "VCID-yh8v-ebxn-z7dp",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77497",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77503",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77528",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77538",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77547",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77573",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77558",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77556",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77594",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77592",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77586",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4237"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558",
                    "reference_id": "719558",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839",
                    "reference_id": "995839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995839"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1391",
                    "reference_id": "RHSA-2014:1391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1391"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1991-1/",
                    "reference_id": "USN-1991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-4237"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61768?format=api",
            "vulnerability_id": "VCID-za5g-uj5p-5kd4",
            "summary": "Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .",
            "references": [
                {
                    "reference_url": "http://osvdb.org/89747",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/89747"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0769.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1605.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8414",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84057",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84073",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84075",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84098",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84105",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84122",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84116",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84112",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84134",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84136",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0242"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/51951"
                },
                {
                    "reference_url": "http://secunia.com/advisories/55113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/55113"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/81707"
                },
                {
                    "reference_url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=15078"
                },
                {
                    "reference_url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/01/30/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/01/30/5"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/57638",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/57638"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1028063",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1028063"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1991-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1991-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2014-0008.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399",
                    "reference_id": "699399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=905874",
                    "reference_id": "905874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=905874"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0242",
                    "reference_id": "CVE-2013-0242",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0242"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201503-04",
                    "reference_id": "GLSA-201503-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201503-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0769",
                    "reference_id": "RHSA-2013:0769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1605",
                    "reference_id": "RHSA-2013:1605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1605"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1991-1/",
                    "reference_id": "USN-1991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85727?format=api",
                    "purl": "pkg:ebuild/sys-libs/glibc@2.19-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
                }
            ],
            "aliases": [
                "CVE-2013-0242"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"
}