Lookup for vulnerable packages by Package URL.

GET /api/packages/924615?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "gtk+2.0",
    "version": "2.24.33-10",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51460?format=api",
            "vulnerability_id": "VCID-1jyr-kac3-2ua2",
            "summary": "The GdkPixbuf library, that is also included in GTK+ 2, contains\n    vulnerabilities that could lead to a Denial of Service or the execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8232",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82334",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82352",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82373",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82399",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01719",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82396",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2976"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17522"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17538"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17562"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17592"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17594"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17615"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17657"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17710"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17770"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17791"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015216"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-911"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-913"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-810.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-810.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15428",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15428"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-216-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-216-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2433"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617772",
                    "reference_id": "1617772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617772"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431",
                    "reference_id": "339431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2976",
                    "reference_id": "CVE-2005-2976",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2976"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200511-14",
                    "reference_id": "GLSA-200511-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200511-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:810",
                    "reference_id": "RHSA-2005:810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:810"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/216-1/",
                    "reference_id": "USN-216-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/216-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924618?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.6.10-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.10-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-2976"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1jyr-kac3-2ua2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51459?format=api",
            "vulnerability_id": "VCID-3vjs-geuw-j7h7",
            "summary": "The GdkPixbuf library, that is also included in GTK+ 2, contains\n    vulnerabilities that could lead to a Denial of Service or the execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93738",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9371",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93723",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93732",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93734",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17522"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17538"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17562"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17588"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17591"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17592"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17594"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17615"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17657"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17710"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17770"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17791"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015216"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-911"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-913"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-810.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-810.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-811.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-811.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15429"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-216-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-216-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2433"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617771",
                    "reference_id": "1617771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617771"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431",
                    "reference_id": "339431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2975",
                    "reference_id": "CVE-2005-2975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2975"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200511-14",
                    "reference_id": "GLSA-200511-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200511-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:810",
                    "reference_id": "RHSA-2005:810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:810"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:811",
                    "reference_id": "RHSA-2005:811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/216-1/",
                    "reference_id": "USN-216-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/216-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924618?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.6.10-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.10-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-2975"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjs-geuw-j7h7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/135245?format=api",
            "vulnerability_id": "VCID-7ftr-5ebq-fkd7",
            "summary": "Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ before 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66611",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66677",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.667",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66715",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66735",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66722",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00517",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66692",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4833"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924620?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-4833"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ftr-5ebq-fkd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88775?format=api",
            "vulnerability_id": "VCID-7qjy-sgc4-1fc6",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "http://osvdb.org/31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/31621"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0010.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0010.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76091",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76029",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76032",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76065",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76045",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76078",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76092",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76117",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76093",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-0010"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218932"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23884"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23933"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23935",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23935"
                },
                {
                    "reference_url": "http://secunia.com/advisories/23984",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/23984"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24006"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24010"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24095",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24095"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1017552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1017552"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-984",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-984"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325"
                },
                {
                    "reference_url": "https://www.debian.org/security/2007/dsa-1256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2007/dsa-1256"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:039"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_02_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_02_sr.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0019.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/22209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/22209"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-415-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-415-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/0331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/0331"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618260",
                    "reference_id": "1618260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618260"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0010",
                    "reference_id": "CVE-2007-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0010"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29520.txt",
                    "reference_id": "CVE-2007-0010;OSVDB-31621",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29520.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/22209/info",
                    "reference_id": "CVE-2007-0010;OSVDB-31621",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/22209/info"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0019",
                    "reference_id": "RHSA-2007:0019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0019"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/415-1/",
                    "reference_id": "USN-415-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/415-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924619?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.8.20-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.8.20-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-0010"
            ],
            "risk_score": 3.8,
            "exploitability": "2.0",
            "weighted_severity": "1.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7qjy-sgc4-1fc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92582?format=api",
            "vulnerability_id": "VCID-bcqw-ykyp-93e6",
            "summary": "GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11034",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11178",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11237",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11052",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11131",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11187",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11164",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11138",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1949"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1949",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1949"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738828",
                    "reference_id": "738828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738828"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924620?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-1949"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcqw-ykyp-93e6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51706?format=api",
            "vulnerability_id": "VCID-drq5-6jps-skax",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88871",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88876",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88839",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88841",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88859",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4491"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252290",
                    "reference_id": "1252290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252290"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-05",
                    "reference_id": "GLSA-201512-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-88",
                    "reference_id": "mfsa2015-88",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-88"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1682",
                    "reference_id": "RHSA-2015:1682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1694",
                    "reference_id": "RHSA-2015:1694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1694"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2712-1/",
                    "reference_id": "USN-2712-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2712-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2722-1/",
                    "reference_id": "USN-2722-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2722-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924623?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.21.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.21.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-4491"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89415?format=api",
            "vulnerability_id": "VCID-e4t8-whcc-r7c4",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96413",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9642",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96424",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96427",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96439",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96443",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96444",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27699",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96447",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0783"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617284",
                    "reference_id": "1617284",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617284"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2004:447",
                    "reference_id": "RHSA-2004:447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2004:447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2004:466",
                    "reference_id": "RHSA-2004:466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2004:466"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924613?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.4.9-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.4.9-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0783"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e4t8-whcc-r7c4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51461?format=api",
            "vulnerability_id": "VCID-ecuv-xp49-5yeh",
            "summary": "The GdkPixbuf library, that is also included in GTK+ 2, contains\n    vulnerabilities that could lead to a Denial of Service or the execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84512",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84439",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84454",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84474",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84476",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84497",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84503",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84521",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84516",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3186"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17522"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17538"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17562"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17588"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17591"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17592"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17594"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17615"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17657"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17710"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17770"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17791"
                },
                {
                    "reference_url": "http://secunia.com/advisories/18509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/18509"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/188"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015216"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-911"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-913"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-810.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-810.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-811.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-811.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15435"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-216-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-216-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2433"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617795",
                    "reference_id": "1617795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617795"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431",
                    "reference_id": "339431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3186",
                    "reference_id": "CVE-2005-3186",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3186"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200511-14",
                    "reference_id": "GLSA-200511-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200511-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:810",
                    "reference_id": "RHSA-2005:810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:810"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:811",
                    "reference_id": "RHSA-2005:811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:811"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/216-1/",
                    "reference_id": "USN-216-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/216-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924618?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.6.10-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.10-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-3186"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecuv-xp49-5yeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89414?format=api",
            "vulnerability_id": "VCID-epbu-y9uy-83bs",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96626",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9664",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96644",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96652",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96654",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96656",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.30045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96659",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617283",
                    "reference_id": "1617283",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617283"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2004:447",
                    "reference_id": "RHSA-2004:447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2004:447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2004:466",
                    "reference_id": "RHSA-2004:466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2004:466"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924613?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.4.9-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.4.9-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0782"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epbu-y9uy-83bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57845?format=api",
            "vulnerability_id": "VCID-f3g6-ambh-fkbn",
            "summary": "This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2011. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1246",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12564",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12605",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12414",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12547",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12517",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12438",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=565527",
                    "reference_id": "565527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565527"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201412-08",
                    "reference_id": "GLSA-201412-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201412-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924621?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.18.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.18.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0732"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f3g6-ambh-fkbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86641?format=api",
            "vulnerability_id": "VCID-g4kk-jxb9-f3g5",
            "summary": "gtk3: Integer overflow in image handling",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7447.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7447.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88193",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88199",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88192",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88133",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88142",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88158",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88164",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88189",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7447"
                },
                {
                    "reference_url": "https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=703220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=703220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/gtk+/tree/NEWS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/gtk+/tree/NEWS"
                },
                {
                    "reference_url": "https://github.com/mate-desktop/eom/issues/93",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/mate-desktop/eom/issues/93"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/10/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/10/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/10/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/10/6"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/83239",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/83239"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2898-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2898-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2898-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2898-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306681",
                    "reference_id": "1306681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306681"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275",
                    "reference_id": "799275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818090",
                    "reference_id": "818090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818090"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7447",
                    "reference_id": "CVE-2013-7447",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7447"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2898-1/",
                    "reference_id": "USN-2898-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2898-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2898-2/",
                    "reference_id": "USN-2898-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2898-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924622?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.30-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.30-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-7447"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g4kk-jxb9-f3g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89159?format=api",
            "vulnerability_id": "VCID-juz2-dgbr-4bd7",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83782",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83792",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83786",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83716",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83729",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83743",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83746",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8377",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83776",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0891"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17657",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17657"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-343.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-343.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-344.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-344.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/419771/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/419771/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/12950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/12950"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617587",
                    "reference_id": "1617587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617587"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0891",
                    "reference_id": "CVE-2005-0891",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0891"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:343",
                    "reference_id": "RHSA-2005:343",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:343"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:344",
                    "reference_id": "RHSA-2005:344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:344"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/108-1/",
                    "reference_id": "USN-108-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/108-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924617?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.6.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-0891"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-juz2-dgbr-4bd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60181?format=api",
            "vulnerability_id": "VCID-k2ph-py3f-aycu",
            "summary": "Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow\n    remote attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84967",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84889",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84923",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84927",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84957",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84973",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02374",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84972",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3378"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/01/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/01/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/02/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/02/9"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76953",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76953"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2767-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2767-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261836",
                    "reference_id": "1261836",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261836"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7673",
                    "reference_id": "CVE-2015-7673",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7673"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-05",
                    "reference_id": "GLSA-201512-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2767-1/",
                    "reference_id": "USN-2767-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2767-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924623?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.21.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.21.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-7673"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ph-py3f-aycu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60182?format=api",
            "vulnerability_id": "VCID-qwv5-ntpt-mbbp",
            "summary": "Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow\n    remote attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81413",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81348",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81358",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8138",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81378",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81406",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8141",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8142",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7674"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3378"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/01/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/01/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/01/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/01/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/02/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/02/10"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/05/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/05/7"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76955",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76955"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2767-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2767-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1268249",
                    "reference_id": "1268249",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1268249"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7674",
                    "reference_id": "CVE-2015-7674",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7674"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-05",
                    "reference_id": "GLSA-201512-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2767-1/",
                    "reference_id": "USN-2767-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2767-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924623?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.21.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.21.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-7674"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwv5-ntpt-mbbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/135243?format=api",
            "vulnerability_id": "VCID-s2v6-rey6-jqen",
            "summary": "Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ before 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4831",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31236",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31365",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31226",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31278",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31314",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31271",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31228",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4831"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924620?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-4831"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2v6-rey6-jqen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59710?format=api",
            "vulnerability_id": "VCID-t3uk-tgks-eqgr",
            "summary": "A vulnerability has been discovered in Gtk+, which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6655.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6655.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6655",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15838",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15955",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16019",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15818",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15904",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15965",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15945",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15906",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6655"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2024/09/09/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2024/09/09/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297098",
                    "reference_id": "2297098",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297098"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2024-6655",
                    "reference_id": "CVE-2024-6655",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2024-6655"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0",
                    "reference_id": "diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202506-05",
                    "reference_id": "GLSA-202506-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202506-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6963",
                    "reference_id": "RHSA-2024:6963",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6963"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9184",
                    "reference_id": "RHSA-2024:9184",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9184"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6899-1/",
                    "reference_id": "USN-6899-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6899-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924624?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-6655"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t3uk-tgks-eqgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89416?format=api",
            "vulnerability_id": "VCID-y1dx-tg6t-aqe4",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94022",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94032",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94054",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94058",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94063",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617290",
                    "reference_id": "1617290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2004:447",
                    "reference_id": "RHSA-2004:447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2004:447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2004:466",
                    "reference_id": "RHSA-2004:466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2004:466"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924613?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.4.9-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.4.9-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0788"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1dx-tg6t-aqe4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/128864?format=api",
            "vulnerability_id": "VCID-z4pw-yw4k-9qch",
            "summary": "Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified \"relative search path.\"",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40725",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40837",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40811",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40819",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40803",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0848"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34259"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49228"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0848",
                    "reference_id": "CVE-2009-0848",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0848"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924620?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924614?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924612?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924616?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924615?format=api",
                    "purl": "pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-0848"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4pw-yw4k-9qch"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie"
}