Lookup for vulnerable packages by Package URL.

GET /api/packages/941153?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "tigervnc",
    "version": "1.15.0+dfsg-2",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49850?format=api",
            "vulnerability_id": "VCID-2cqy-wq3e-dyat",
            "summary": "Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26117.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71863",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7182",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71826",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71808",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71854",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7186",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76169",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76195",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76168",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76107",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76156",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76111",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76143",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76123",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26117"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882841",
                    "reference_id": "1882841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1882841"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272",
                    "reference_id": "971272",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971272"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-14",
                    "reference_id": "GLSA-202407-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1783",
                    "reference_id": "RHSA-2021:1783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1783"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5965-1/",
                    "reference_id": "USN-5965-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5965-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941159?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-26117"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2cqy-wq3e-dyat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38391?format=api",
            "vulnerability_id": "VCID-35c9-gt1z-6yfp",
            "summary": "Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7395.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7395.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50996",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51029",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00276",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51036",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6516",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65046",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65096",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65123",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65087",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65136",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65149",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65158",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65166",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65176",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7395"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/436"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/436/commits/bf3bdac082978ca32895a4b6a123016094905689"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438701",
                    "reference_id": "1438701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438701"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259",
                    "reference_id": "859259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7395",
                    "reference_id": "CVE-2017-7395",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7395"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-13",
                    "reference_id": "GLSA-201801-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941157?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7395"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35c9-gt1z-6yfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38392?format=api",
            "vulnerability_id": "VCID-4ccf-xab2-nfg1",
            "summary": "Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7396.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7396.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64157",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6412",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64156",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64168",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67189",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67221",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67207",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67104",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67141",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67164",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00528",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67139",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70256",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70255",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70248",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7396"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/436"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/436/commits/dccb5f7d776e93863ae10bbff56a45c523c6eeb0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/436/commits/dccb5f7d776e93863ae10bbff56a45c523c6eeb0"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438703",
                    "reference_id": "1438703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438703"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259",
                    "reference_id": "859259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7396",
                    "reference_id": "CVE-2017-7396",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7396"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-13",
                    "reference_id": "GLSA-201801-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941157?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7396"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ccf-xab2-nfg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49849?format=api",
            "vulnerability_id": "VCID-4kdt-7mph-j3ej",
            "summary": "Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87081",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87102",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8713",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87138",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87133",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87149",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8715",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87169",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87175",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87176",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790318",
                    "reference_id": "1790318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428",
                    "reference_id": "947428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-14",
                    "reference_id": "GLSA-202407-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1497",
                    "reference_id": "RHSA-2020:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3875",
                    "reference_id": "RHSA-2020:3875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3875"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941158?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-15695"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4kdt-7mph-j3ej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49848?format=api",
            "vulnerability_id": "VCID-58x9-2uk3-6bhp",
            "summary": "Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90663",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90668",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90678",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90687",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90698",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90712",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90709",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90728",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90723",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90737",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90732",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790315",
                    "reference_id": "1790315",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790315"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428",
                    "reference_id": "947428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-14",
                    "reference_id": "GLSA-202407-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1497",
                    "reference_id": "RHSA-2020:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3875",
                    "reference_id": "RHSA-2020:3875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3875"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941158?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-15694"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-58x9-2uk3-6bhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42295?format=api",
            "vulnerability_id": "VCID-6ujy-cukz-dqfh",
            "summary": "An integer overflow in TigerVNC might allow remote attackers to\n    execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8240.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8240.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78065",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77929",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77936",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77963",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77945",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77972",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77976",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78003",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77986",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77985",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7802",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78012",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78044",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78052",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8240"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240"
                },
                {
                    "reference_url": "http://seclists.org/oss-sec/2014/q4/278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/oss-sec/2014/q4/278"
                },
                {
                    "reference_url": "http://seclists.org/oss-sec/2014/q4/300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/oss-sec/2014/q4/300"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96947"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70391",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70391"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151307",
                    "reference_id": "1151307",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151307"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849479",
                    "reference_id": "849479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849479"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.90:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:0.0.91:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8240",
                    "reference_id": "CVE-2014-8240",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8240"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-36",
                    "reference_id": "GLSA-201612-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201612-36"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2233",
                    "reference_id": "RHSA-2015:2233",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2233"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941154?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-8240"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ujy-cukz-dqfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86099?format=api",
            "vulnerability_id": "VCID-877z-wag9-xufy",
            "summary": "tigervnc: NULL pointer dereference flaw in XRegion",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71867",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71875",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71894",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71866",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71904",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71916",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71939",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71922",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71947",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71951",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71936",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71981",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71988",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00695",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71985",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8241"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151312",
                    "reference_id": "1151312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151312"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849478",
                    "reference_id": "849478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2233",
                    "reference_id": "RHSA-2015:2233",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2233"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941155?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-8241"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-877z-wag9-xufy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38389?format=api",
            "vulnerability_id": "VCID-c64p-mvgq-h3ab",
            "summary": "Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7394.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7394.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7893",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78906",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01193",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78913",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86152",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86083",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86117",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86129",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86143",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86142",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86138",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86156",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86161",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7394"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/440"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438700",
                    "reference_id": "1438700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438700"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259",
                    "reference_id": "859259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7394",
                    "reference_id": "CVE-2017-7394",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7394"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-13",
                    "reference_id": "GLSA-201801-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941157?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7394"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c64p-mvgq-h3ab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38386?format=api",
            "vulnerability_id": "VCID-eg3c-u9w7-23cj",
            "summary": "Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7392.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7392.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62143",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6231",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62305",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6229",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62299",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62316",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62202",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62232",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62199",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62249",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62266",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62274",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62253",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62298",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7392"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/441"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438694",
                    "reference_id": "1438694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438694"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259",
                    "reference_id": "859259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7392",
                    "reference_id": "CVE-2017-7392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-13",
                    "reference_id": "GLSA-201801-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941157?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7392"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eg3c-u9w7-23cj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87401?format=api",
            "vulnerability_id": "VCID-kme1-gr1m-zfh8",
            "summary": "tigervnc: vncviewer can send password to server without proper validation of the X.509 certificate",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060567.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/05/06/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/05/06/2"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/05/09/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/05/09/7"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64998",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64853",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64903",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64931",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64894",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64958",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64976",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64966",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64938",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64974",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64986",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64989",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00477",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65002",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1775"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=702672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702672"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44939"
                },
                {
                    "reference_url": "http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01342.html"
                },
                {
                    "reference_url": "http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01345.html"
                },
                {
                    "reference_url": "http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mail-archive.com/tigervnc-devel%40lists.sourceforge.net/msg01347.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0871.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0871.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/47738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/47738"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=702470",
                    "reference_id": "702470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702470"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.1:beta1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1775",
                    "reference_id": "CVE-2011-1775",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1775"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0871",
                    "reference_id": "RHSA-2011:0871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0871"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941151?format=api",
                    "purl": "pkg:deb/debian/tigervnc@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-1775"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kme1-gr1m-zfh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38388?format=api",
            "vulnerability_id": "VCID-p8yq-vpuh-nkg4",
            "summary": "Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7393.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7393.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78876",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78853",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7886",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.839",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83801",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83815",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8383",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83855",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83861",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83877",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83871",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83901",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7393"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/TigerVNC/tigervnc/pull/438",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/TigerVNC/tigervnc/pull/438"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97305"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438697",
                    "reference_id": "1438697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1438697"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259",
                    "reference_id": "859259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859259"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tigervnc:tigervnc:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7393",
                    "reference_id": "CVE-2017-7393",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7393"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-13",
                    "reference_id": "GLSA-201801-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941157?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7393"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8yq-vpuh-nkg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50874?format=api",
            "vulnerability_id": "VCID-ts81-hqju-7bdu",
            "summary": "A buffer overflow in TigerVNC might allow remote attackers to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5581.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5581.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86936",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86966",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86959",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86979",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86986",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86999",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86994",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86988",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87004",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87007",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87005",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87024",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8703",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87032",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5581"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415712",
                    "reference_id": "1415712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415712"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852213",
                    "reference_id": "852213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=852213"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201702-19",
                    "reference_id": "GLSA-201702-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201702-19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0630",
                    "reference_id": "RHSA-2017:0630",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0630"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941156?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0%2Bdfsg-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0%252Bdfsg-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5581"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ts81-hqju-7bdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61861?format=api",
            "vulnerability_id": "VCID-u17b-f4ew-dudp",
            "summary": "A buffer overflow in TigerVNC could result in execution of\n    arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67854",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67877",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67896",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67876",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67926",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6794",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67964",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6795",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67914",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67952",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67965",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67946",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78854",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7886",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01188",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78877",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0011"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050928",
                    "reference_id": "1050928",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050928"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201411-03",
                    "reference_id": "GLSA-201411-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201411-03"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941151?format=api",
                    "purl": "pkg:deb/debian/tigervnc@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-0011"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u17b-f4ew-dudp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81715?format=api",
            "vulnerability_id": "VCID-vgaa-3fm8-bbdq",
            "summary": "tigervnc: Heap buffer overflow in TightDecoder::FilterGradient",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15693.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15693.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92561",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92567",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92573",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92587",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92591",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92597",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92598",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9261",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92609",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92615",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15693"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790313",
                    "reference_id": "1790313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1790313"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428",
                    "reference_id": "947428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1497",
                    "reference_id": "RHSA-2020:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3875",
                    "reference_id": "RHSA-2020:3875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3875"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941158?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-15693"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vgaa-3fm8-bbdq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38385?format=api",
            "vulnerability_id": "VCID-vz9s-w84f-efb7",
            "summary": "Multiple vulnerabilities have been found in TigerVNC, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10207.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10207.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82153",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82166",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82188",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8221",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82217",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82229",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82223",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82261",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82282",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82294",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82299",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418761",
                    "reference_id": "1418761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418761"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-13",
                    "reference_id": "GLSA-201801-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0630",
                    "reference_id": "RHSA-2017:0630",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0630"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2000",
                    "reference_id": "RHSA-2017:2000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2000"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941154?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.7.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.7.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-10207"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vz9s-w84f-efb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49846?format=api",
            "vulnerability_id": "VCID-wspa-k6wk-kqhb",
            "summary": "Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15691.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15691.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87871",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87882",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87895",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87898",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87919",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87926",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87936",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87929",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87943",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8796",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87966",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15691"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789908",
                    "reference_id": "1789908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789908"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428",
                    "reference_id": "947428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-14",
                    "reference_id": "GLSA-202407-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1497",
                    "reference_id": "RHSA-2020:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3875",
                    "reference_id": "RHSA-2020:3875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3875"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941158?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-15691"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wspa-k6wk-kqhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49847?format=api",
            "vulnerability_id": "VCID-yvqe-mjea-pud2",
            "summary": "Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15692.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-15692.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89719",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89722",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89737",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89739",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89756",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89763",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89769",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89768",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89761",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89777",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89771",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89785",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89787",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89786",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-15692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789527",
                    "reference_id": "1789527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789527"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428",
                    "reference_id": "947428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947428"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-14",
                    "reference_id": "GLSA-202407-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1497",
                    "reference_id": "RHSA-2020:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3875",
                    "reference_id": "RHSA-2020:3875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3875"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941158?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.10.1%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.10.1%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941152?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.11.0%2Bdfsg-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.11.0%252Bdfsg-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941150?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.12.0%2Bdfsg-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.12.0%252Bdfsg-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/941153?format=api",
                    "purl": "pkg:deb/debian/tigervnc@1.15.0%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-15692"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvqe-mjea-pud2"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tigervnc@1.15.0%252Bdfsg-2%3Fdistro=trixie"
}