Lookup for vulnerable packages by Package URL.

GET /api/packages/923118?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/923118?format=api",
    "purl": "pkg:deb/debian/giflib@4.1.4-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "giflib",
    "version": "4.1.4-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.1.2-0.1",
    "latest_non_vulnerable_version": "5.2.2-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56927?format=api",
            "vulnerability_id": "VCID-5byx-7b2n-hkdh",
            "summary": "giflib may dereference NULL or write out of bounds when processing\n    malformed images, potentially resulting in Denial of Service or arbitrary\n    code execution.",
            "references": [
                {
                    "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=109997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.gentoo.org/show_bug.cgi?id=109997"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3350.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3350.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89775",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89709",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89725",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89743",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89749",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89756",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89754",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89747",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89764",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89758",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89773",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3350"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171413"
                },
                {
                    "reference_url": "http://scary.beasts.org/security/CESA-2005-007.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://scary.beasts.org/security/CESA-2005-007.txt"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17436"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17438"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17442",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17442"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17462"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17482"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17488"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17497"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17508"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17559"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34872"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35164"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015149",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015149"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=364493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?release_id=364493"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9314"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00771.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00771.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-890"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-03.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-03.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:207"
                },
                {
                    "reference_url": "http://www.osvdb.org/20471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/20471"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-828.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-828.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0444.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0444.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428059/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428059/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428059/30/6300/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428059/30/6300/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15299"
                },
                {
                    "reference_url": "http://www.ubuntulinux.org/usn/usn-214-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntulinux.org/usn/usn-214-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2295"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=395382",
                    "reference_id": "395382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=395382"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=494823",
                    "reference_id": "494823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494823"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libungif:libungif:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:4.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libungif:libungif:4.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:4.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3350",
                    "reference_id": "CVE-2005-3350",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3350"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200511-03",
                    "reference_id": "GLSA-200511-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200511-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:828",
                    "reference_id": "RHSA-2005:828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0444",
                    "reference_id": "RHSA-2009:0444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0444"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/214-1/",
                    "reference_id": "USN-214-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/214-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923118?format=api",
                    "purl": "pkg:deb/debian/giflib@4.1.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@4.1.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923119?format=api",
                    "purl": "pkg:deb/debian/giflib@5.1.9-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-276w-96xc-5be1"
                        },
                        {
                            "vulnerability": "VCID-c3n5-vvnd-3uc8"
                        },
                        {
                            "vulnerability": "VCID-dv4g-b5vw-huf4"
                        },
                        {
                            "vulnerability": "VCID-nz8n-htdu-k7gw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.1.9-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923117?format=api",
                    "purl": "pkg:deb/debian/giflib@5.2.1-2.5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-276w-96xc-5be1"
                        },
                        {
                            "vulnerability": "VCID-c3n5-vvnd-3uc8"
                        },
                        {
                            "vulnerability": "VCID-dv4g-b5vw-huf4"
                        },
                        {
                            "vulnerability": "VCID-nz8n-htdu-k7gw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.2.1-2.5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923120?format=api",
                    "purl": "pkg:deb/debian/giflib@5.2.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.2.2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-3350"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5byx-7b2n-hkdh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56926?format=api",
            "vulnerability_id": "VCID-6uh1-fjn3-6kc7",
            "summary": "giflib may dereference NULL or write out of bounds when processing\n    malformed images, potentially resulting in Denial of Service or arbitrary\n    code execution.",
            "references": [
                {
                    "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=109997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.gentoo.org/show_bug.cgi?id=109997"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2974.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2974.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89599",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89534",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89547",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89548",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89565",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89577",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8957",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89583",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89585",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8958",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89595",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2974"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171413"
                },
                {
                    "reference_url": "http://scary.beasts.org/security/CESA-2005-007.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://scary.beasts.org/security/CESA-2005-007.txt"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17436"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17438"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17442",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17442"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17462"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17482"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17488"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17497"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17508"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17559",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17559"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34872"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35164"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015149",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015149"
                },
                {
                    "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=364493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sourceforge.net/project/shownotes.php?release_id=364493"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10994"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00771.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00771.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-890"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-03.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-03.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:207"
                },
                {
                    "reference_url": "http://www.osvdb.org/20470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/20470"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-828.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-828.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0444.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0444.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/advisories/9636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/advisories/9636"
                },
                {
                    "reference_url": "http://www.securityfocus.com/advisories/9637",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/advisories/9637"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428059/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428059/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428059/30/6300/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428059/30/6300/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15304"
                },
                {
                    "reference_url": "http://www.ubuntulinux.org/usn/usn-214-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntulinux.org/usn/usn-214-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2295"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=395382",
                    "reference_id": "395382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=395382"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=494826",
                    "reference_id": "494826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494826"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libungif:libungif:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:4.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libungif:libungif:4.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libungif:libungif:4.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2974",
                    "reference_id": "CVE-2005-2974",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2974"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200511-03",
                    "reference_id": "GLSA-200511-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200511-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:828",
                    "reference_id": "RHSA-2005:828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0444",
                    "reference_id": "RHSA-2009:0444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0444"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/214-1/",
                    "reference_id": "USN-214-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/214-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923118?format=api",
                    "purl": "pkg:deb/debian/giflib@4.1.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@4.1.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923119?format=api",
                    "purl": "pkg:deb/debian/giflib@5.1.9-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-276w-96xc-5be1"
                        },
                        {
                            "vulnerability": "VCID-c3n5-vvnd-3uc8"
                        },
                        {
                            "vulnerability": "VCID-dv4g-b5vw-huf4"
                        },
                        {
                            "vulnerability": "VCID-nz8n-htdu-k7gw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.1.9-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923117?format=api",
                    "purl": "pkg:deb/debian/giflib@5.2.1-2.5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-276w-96xc-5be1"
                        },
                        {
                            "vulnerability": "VCID-c3n5-vvnd-3uc8"
                        },
                        {
                            "vulnerability": "VCID-dv4g-b5vw-huf4"
                        },
                        {
                            "vulnerability": "VCID-nz8n-htdu-k7gw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.2.1-2.5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923120?format=api",
                    "purl": "pkg:deb/debian/giflib@5.2.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.2.2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-2974"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6uh1-fjn3-6kc7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83443?format=api",
            "vulnerability_id": "VCID-er2y-2gp1-6uge",
            "summary": "giflib: heap-based buffer overflow in DGifDecompressLine function in dgif_lib.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11489.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11489.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66011",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66156",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66135",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66123",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66144",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66081",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66047",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66096",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66109",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66128",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66115",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66085",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66121",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11489"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/pts/sam2p/issues/37",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/pts/sam2p/issues/37"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104341"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583399",
                    "reference_id": "1583399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583399"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904113",
                    "reference_id": "904113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904113"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sam2p_project:sam2p:0.49.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:sam2p_project:sam2p:0.49.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sam2p_project:sam2p:0.49.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11489",
                    "reference_id": "CVE-2018-11489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11489"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923118?format=api",
                    "purl": "pkg:deb/debian/giflib@4.1.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@4.1.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923119?format=api",
                    "purl": "pkg:deb/debian/giflib@5.1.9-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-276w-96xc-5be1"
                        },
                        {
                            "vulnerability": "VCID-c3n5-vvnd-3uc8"
                        },
                        {
                            "vulnerability": "VCID-dv4g-b5vw-huf4"
                        },
                        {
                            "vulnerability": "VCID-nz8n-htdu-k7gw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.1.9-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923117?format=api",
                    "purl": "pkg:deb/debian/giflib@5.2.1-2.5?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-276w-96xc-5be1"
                        },
                        {
                            "vulnerability": "VCID-c3n5-vvnd-3uc8"
                        },
                        {
                            "vulnerability": "VCID-dv4g-b5vw-huf4"
                        },
                        {
                            "vulnerability": "VCID-nz8n-htdu-k7gw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.2.1-2.5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923120?format=api",
                    "purl": "pkg:deb/debian/giflib@5.2.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@5.2.2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-11489"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-er2y-2gp1-6uge"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/giflib@4.1.4-1%3Fdistro=trixie"
}