Lookup for vulnerable packages by Package URL.

GET /api/packages/929090?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "libx11",
    "version": "2:1.8.13-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41702?format=api",
            "vulnerability_id": "VCID-16w3-mvk5-8bfg",
            "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91592",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91599",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91605",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91632",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91636",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93458",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93427",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93428",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93447",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93452",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242",
                    "reference_id": "1623242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623242"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-01",
                    "reference_id": "GLSA-201811-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079",
                    "reference_id": "RHSA-2019:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929097?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-14600"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16w3-mvk5-8bfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47741?format=api",
            "vulnerability_id": "VCID-22vh-wnqm-qqh5",
            "summary": "Multiple vulnerabilities have been found in X.Org  server and\n    libraries, the worse of which allowing local attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7943.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8894",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88948",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88964",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88985",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89002",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88997",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88995",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89009",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89007",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89003",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7943"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861",
                    "reference_id": "1381861",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381861"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439",
                    "reference_id": "840439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201704-03",
                    "reference_id": "GLSA-201704-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201704-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929096?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-7943"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22vh-wnqm-qqh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49831?format=api",
            "vulnerability_id": "VCID-6cns-hbja-1bab",
            "summary": "X.org, libX11, xdm, xf86dga, xinit, xload, xtrans, and xterm are vulnerable\n    to local privilege escalations because of unchecked setuid() calls.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4447.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38864",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38996",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39016",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38947",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39014",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39027",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38991",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38964",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39011",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38917",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4447"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-25",
                    "reference_id": "GLSA-200608-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-25"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200704-22",
                    "reference_id": "GLSA-200704-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200704-22"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929088?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.0.0-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.0-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-4447"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6cns-hbja-1bab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37952?format=api",
            "vulnerability_id": "VCID-941j-gajx-1qc9",
            "summary": "A vulnerability in X.Org X11 library could lead to a Denial of\n    Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-31535.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83844",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83938",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83857",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83905",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83921",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83915",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-31535"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822",
                    "reference_id": "1961822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961822"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737",
                    "reference_id": "988737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988737"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-12",
                    "reference_id": "ASA-202105-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1968",
                    "reference_id": "AVG-1968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1968"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-16",
                    "reference_id": "GLSA-202105-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3296",
                    "reference_id": "RHSA-2021:3296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3477",
                    "reference_id": "RHSA-2021:3477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4326",
                    "reference_id": "RHSA-2021:4326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4326"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4966-1/",
                    "reference_id": "USN-4966-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4966-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4966-2/",
                    "reference_id": "USN-4966-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4966-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929100?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-31535"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-941j-gajx-1qc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58827?format=api",
            "vulnerability_id": "VCID-byet-4t52-1kf5",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43785.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27561",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27616",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27626",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.276",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27604",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2767",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27714",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27718",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27675",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252",
                    "reference_id": "2242252",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242252"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43785",
                    "reference_id": "CVE-2023-43785",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-43785"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145",
                    "reference_id": "RHSA-2024:2145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973",
                    "reference_id": "RHSA-2024:2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T15:44:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-1/",
                    "reference_id": "USN-6407-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-2/",
                    "reference_id": "USN-6407-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929104?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-43785"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byet-4t52-1kf5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88807?format=api",
            "vulnerability_id": "VCID-c9rf-ax2v-n7ft",
            "summary": "CVE-2006-5397 libX11 file descriptor leak",
            "references": [
                {
                    "reference_url": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git%3Ba=commit%3Bh=686bb8b35acf6cecae80fe89b2b5853f5816ce19",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://gitweb.freedesktop.org/?p=xorg/lib/libX11.git%3Ba=commit%3Bh=686bb8b35acf6cecae80fe89b2b5853f5816ce19"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5397.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5397.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5397",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23157",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2313",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23305",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23348",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2321",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23283",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23187",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23204",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23197",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5397"
                },
                {
                    "reference_url": "https://bugs.freedesktop.org/show_bug.cgi?id=8699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.freedesktop.org/show_bug.cgi?id=8699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5397",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5397"
                },
                {
                    "reference_url": "http://secunia.com/advisories/22642",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/22642"
                },
                {
                    "reference_url": "http://secunia.com/advisories/22749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/22749"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29956"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:199"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/20845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/20845"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/4289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/4289"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=213280",
                    "reference_id": "213280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=213280"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398460",
                    "reference_id": "398460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=398460"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:1.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5397",
                    "reference_id": "CVE-2006-5397",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5397"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929092?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.0.3-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-5397"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9rf-ax2v-n7ft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35545?format=api",
            "vulnerability_id": "VCID-dcgs-qd3h-k7gq",
            "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2004.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60313",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60145",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60221",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60247",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60214",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60264",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60286",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60266",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60306",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004"
                },
                {
                    "reference_url": "http://www.debian.org/security/2013/dsa-2693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2013/dsa-2693"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1854-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1854-1"
                },
                {
                    "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112",
                    "reference_id": "959112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959112"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004",
                    "reference_id": "CVE-2013-2004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2004"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-07",
                    "reference_id": "GLSA-201405-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436",
                    "reference_id": "RHSA-2014:1436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1436"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1854-1/",
                    "reference_id": "USN-1854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1854-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929094?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-2004"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcgs-qd3h-k7gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55988?format=api",
            "vulnerability_id": "VCID-e19k-nptv-ffgr",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7439.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83061",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83077",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83091",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83122",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83138",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83132",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83128",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83165",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83166",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83169",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-7439"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7439"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943",
                    "reference_id": "1209943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436",
                    "reference_id": "RHSA-2014:1436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1436"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2568-1/",
                    "reference_id": "USN-2568-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2568-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929095?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-7439"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e19k-nptv-ffgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58828?format=api",
            "vulnerability_id": "VCID-e89b-946w-g7fp",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24377",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24557",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24398",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24414",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24406",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24594",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2444",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24485",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24499",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24455",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253",
                    "reference_id": "2242253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242253"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43786",
                    "reference_id": "CVE-2023-43786",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-43786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145",
                    "reference_id": "RHSA-2024:2145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973",
                    "reference_id": "RHSA-2024:2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T16:06:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-1/",
                    "reference_id": "USN-6407-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-2/",
                    "reference_id": "USN-6407-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-1/",
                    "reference_id": "USN-6408-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-2/",
                    "reference_id": "USN-6408-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929104?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-43786"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e89b-946w-g7fp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41701?format=api",
            "vulnerability_id": "VCID-enay-5y1j-ffa4",
            "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82256",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82269",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82288",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82317",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82337",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82508",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82473",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82468",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82504",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250",
                    "reference_id": "1623250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623250"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-01",
                    "reference_id": "GLSA-201811-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079",
                    "reference_id": "RHSA-2019:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929097?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-14599"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-enay-5y1j-ffa4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35498?format=api",
            "vulnerability_id": "VCID-j2u9-4cr6-yqcv",
            "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1981.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75629",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75526",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75556",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75536",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75578",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75613",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75595",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75625",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004"
                },
                {
                    "reference_url": "http://www.debian.org/security/2013/dsa-2693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2013/dsa-2693"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/60120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/60120"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1854-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1854-1"
                },
                {
                    "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040",
                    "reference_id": "959040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=959040"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981",
                    "reference_id": "CVE-2013-1981",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1981"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-07",
                    "reference_id": "GLSA-201405-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436",
                    "reference_id": "RHSA-2014:1436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1436"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1854-1/",
                    "reference_id": "USN-1854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1854-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929094?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-1981"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2u9-4cr6-yqcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35527?format=api",
            "vulnerability_id": "VCID-jz8t-44r3-3yc5",
            "summary": "Multiple vulnerabilities have been found in X.Org X Server,\n    allowing attackers to execute arbitrary code or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106781.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1997.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72648",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72558",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72566",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72582",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72597",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72609",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72633",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72615",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72605",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72647",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00727",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72657",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004"
                },
                {
                    "reference_url": "http://www.debian.org/security/2013/dsa-2693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2013/dsa-2693"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/23/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/05/23/3"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1854-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1854-1"
                },
                {
                    "reference_url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.x.org/wiki/Development/Security/Advisory-2013-05-23"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345",
                    "reference_id": "960345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960345"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x:libx11:1.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997",
                    "reference_id": "CVE-2013-1997",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1997"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201405-07",
                    "reference_id": "GLSA-201405-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201405-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1436",
                    "reference_id": "RHSA-2014:1436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1436"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1854-1/",
                    "reference_id": "USN-1854-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1854-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929094?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.5.0-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.5.0-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-1997"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8t-44r3-3yc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47736?format=api",
            "vulnerability_id": "VCID-ngsj-tzms-97e8",
            "summary": "Multiple vulnerabilities have been found in X.Org  server and\n    libraries, the worse of which allowing local attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7942.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89332",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89348",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8935",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89367",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89371",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89373",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89388",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89385",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859",
                    "reference_id": "1381859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381859"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439",
                    "reference_id": "840439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840439"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201704-03",
                    "reference_id": "GLSA-201704-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201704-03"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929096?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-7942"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngsj-tzms-97e8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41700?format=api",
            "vulnerability_id": "VCID-npqc-cahn-cfgk",
            "summary": "Multiple vulnerabilities have been found in X.Org X11 library, the\n    worst of which could allow for remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14598.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78032",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78041",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7807",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78053",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78079",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78083",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86683",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86671",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86664",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86677",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238",
                    "reference_id": "1623238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623238"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201811-01",
                    "reference_id": "GLSA-201811-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201811-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2079",
                    "reference_id": "RHSA-2019:2079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2079"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-1/",
                    "reference_id": "USN-3758-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3758-2/",
                    "reference_id": "USN-3758-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3758-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929097?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-14598"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npqc-cahn-cfgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58829?format=api",
            "vulnerability_id": "VCID-r53t-w3cp-4kbm",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43787.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12695",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12804",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12575",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12586",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12657",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12736",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12756",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12717",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43787"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254",
                    "reference_id": "2242254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242254"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-43787",
                    "reference_id": "CVE-2023-43787",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-43787"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2145",
                    "reference_id": "RHSA-2024:2145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2973",
                    "reference_id": "RHSA-2024:2973",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-29T18:42:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-1/",
                    "reference_id": "USN-6407-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6407-2/",
                    "reference_id": "USN-6407-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6407-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-1/",
                    "reference_id": "USN-6408-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6408-2/",
                    "reference_id": "USN-6408-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6408-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929104?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-43787"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r53t-w3cp-4kbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58826?format=api",
            "vulnerability_id": "VCID-sujt-svg4-kbfp",
            "summary": "Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3138.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24061",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23883",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23922",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23911",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23893",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3138"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133",
                    "reference_id": "1038133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038133"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748",
                    "reference_id": "2213748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213748"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-21",
                    "reference_id": "GLSA-202407-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6497",
                    "reference_id": "RHSA-2023:6497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7029",
                    "reference_id": "RHSA-2023:7029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7029"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1088",
                    "reference_id": "RHSA-2024:1088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1088"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1417",
                    "reference_id": "RHSA-2024:1417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1417"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6168-1/",
                    "reference_id": "USN-6168-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6168-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6168-2/",
                    "reference_id": "USN-6168-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6168-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929102?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929101?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929103?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-3138"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sujt-svg4-kbfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59404?format=api",
            "vulnerability_id": "VCID-tmju-y3w5-z3es",
            "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14363.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35381",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3558",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35606",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35559",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35568",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35531",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3548",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14363"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473",
                    "reference_id": "1872473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872473"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008",
                    "reference_id": "969008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969008"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-18",
                    "reference_id": "GLSA-202008-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4908",
                    "reference_id": "RHSA-2020:4908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4908"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4946",
                    "reference_id": "RHSA-2020:4946",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4946"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804",
                    "reference_id": "RHSA-2021:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1804"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-1/",
                    "reference_id": "USN-4487-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-2/",
                    "reference_id": "USN-4487-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929099?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-14363"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmju-y3w5-z3es"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59403?format=api",
            "vulnerability_id": "VCID-tsyg-kprr-67ck",
            "summary": "Multiple vulnerabilities have been found in X.org X11 library, the\n    worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14344.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3701",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37029",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37104",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37087",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37186",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37215",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37097",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37109",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3712",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37086",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37058",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14344"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255",
                    "reference_id": "1862255",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862255"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1212",
                    "reference_id": "AVG-1212",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1212"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-18",
                    "reference_id": "GLSA-202008-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1804",
                    "reference_id": "RHSA-2021:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1804"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-1/",
                    "reference_id": "USN-4487-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4487-2/",
                    "reference_id": "USN-4487-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4487-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929098?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.6.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.6.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-14344"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsyg-kprr-67ck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49805?format=api",
            "vulnerability_id": "VCID-zz57-zmka-33ev",
            "summary": "The X.Org X11 library contains multiple integer overflows, which could lead\n    to the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045"
                },
                {
                    "reference_url": "http://issues.foresightlinux.org/browse/FL-223",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://issues.foresightlinux.org/browse/FL-223"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html"
                },
                {
                    "reference_url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8386",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83932",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83929",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83874",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83892",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83915",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83938",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84247",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1667"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24739"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24741"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24745"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24756"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24758"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24765",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24765"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24771"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24791"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24953",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24953"
                },
                {
                    "reference_url": "http://secunia.com/advisories/24975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/24975"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25004"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25072"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25112"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25131"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25305"
                },
                {
                    "reference_url": "http://secunia.com/advisories/25992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/25992"
                },
                {
                    "reference_url": "http://secunia.com/advisories/26177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/26177"
                },
                {
                    "reference_url": "http://secunia.com/advisories/30161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/30161"
                },
                {
                    "reference_url": "http://secunia.com/advisories/33937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/33937"
                },
                {
                    "reference_url": "http://secunia.com/advisories/36260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/36260"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200705-06.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200705-06.xml"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1211"
                },
                {
                    "reference_url": "https://issues.rpath.com/browse/RPL-1213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.rpath.com/browse/RPL-1213"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT3438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT3438"
                },
                {
                    "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm"
                },
                {
                    "reference_url": "http://www.debian.org/security/2007/dsa-1294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2007/dsa-1294"
                },
                {
                    "reference_url": "http://www.debian.org/security/2009/dsa-1858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2009/dsa-1858"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_27_x.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_27_x.html"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata39.html#021_xorg",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata39.html#021_xorg"
                },
                {
                    "reference_url": "http://www.openbsd.org/errata40.html#011_xorg",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openbsd.org/errata40.html#011_xorg"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/23300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/23300"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1017864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1017864"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-453-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-453-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-453-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-453-2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-481-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-481-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1217"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2007/1531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2007/1531"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=231684",
                    "reference_id": "231684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=231684"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045",
                    "reference_id": "414045",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862",
                    "reference_id": "417862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1667",
                    "reference_id": "CVE-2007-1667",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1667"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200705-06",
                    "reference_id": "GLSA-200705-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200705-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0125",
                    "reference_id": "RHSA-2007:0125",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0125"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0126",
                    "reference_id": "RHSA-2007:0126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0157",
                    "reference_id": "RHSA-2007:0157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0157"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/453-1/",
                    "reference_id": "USN-453-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/453-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/481-1/",
                    "reference_id": "USN-481-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/481-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929093?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.0.3-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api",
                    "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-1667"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zz57-zmka-33ev"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie"
}