{"url":"http://public2.vulnerablecode.io/api/packages/105379?format=json","purl":"pkg:rpm/redhat/harfbuzz@1.7.5-2?arch=el7","type":"rpm","namespace":"redhat","name":"harfbuzz","version":"1.7.5-2","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60940?format=json","vulnerability_id":"VCID-13hw-kece-pyf7","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4200","reference_id":"","reference_type":"","scores":[{"value":"0.35682","scoring_system":"epss","scoring_elements":"0.97049","published_at":"2026-04-02T12:55:00Z"},{"value":"0.35682","scoring_system":"epss","scoring_elements":"0.97042","published_at":"2026-04-01T12:55:00Z"},{"value":"0.35682","scoring_system":"epss","scoring_elements":"0.97053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.37285","scoring_system":"epss","scoring_elements":"0.97165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.37285","scoring_system":"epss","scoring_elements":"0.97156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.37285","scoring_system":"epss","scoring_elements":"0.97166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.37285","scoring_system":"epss","scoring_elements":"0.97171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.97343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.9733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.97339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.97341","published_at":"2026-04-18T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.97342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.97344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.40022","scoring_system":"epss","scoring_elements":"0.97347","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208741","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208741"},{"reference_url":"https://support.apple.com/HT208743","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208743"},{"reference_url":"https://support.apple.com/HT208850","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208850"},{"reference_url":"https://support.apple.com/HT208852","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208852"},{"reference_url":"https://support.apple.com/HT208853","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208853"},{"reference_url":"https://www.exploit-db.com/exploits/44566/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44566/"},{"reference_url":"http://www.securityfocus.com/bid/103961","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/103961"},{"reference_url":"http://www.securitytracker.com/id/1040743","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040743"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577385","reference_id":"1577385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577385"},{"reference_url":"https://security.archlinux.org/ASA-201805-9","reference_id":"ASA-201805-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-9"},{"reference_url":"https://security.archlinux.org/AVG-692","reference_id":"AVG-692","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-692"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1525","reference_id":"CVE-2018-4200","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1525"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html","reference_id":"CVE-2018-4200","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4200","reference_id":"CVE-2018-4200","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4200"},{"reference_url":"https://security.gentoo.org/glsa/201808-04","reference_id":"GLSA-201808-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201808-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3640-1/","reference_id":"USN-3640-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3640-1/"}],"fixed_packages":[],"aliases":["CVE-2018-4200"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13hw-kece-pyf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60942?format=json","vulnerability_id":"VCID-1u61-d4ch-eya4","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4204","reference_id":"","reference_type":"","scores":[{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87524","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0348","scoring_system":"epss","scoring_elements":"0.87537","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88049","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.8799","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.8801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.8802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03746","scoring_system":"epss","scoring_elements":"0.88021","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208741","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208741"},{"reference_url":"https://support.apple.com/HT208743","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208743"},{"reference_url":"https://support.apple.com/HT208848","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208848"},{"reference_url":"https://support.apple.com/HT208850","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208850"},{"reference_url":"https://support.apple.com/HT208852","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208852"},{"reference_url":"https://support.apple.com/HT208853","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208853"},{"reference_url":"http://www.securityfocus.com/bid/103961","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/103961"},{"reference_url":"http://www.securitytracker.com/id/1040743","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040743"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577374","reference_id":"1577374","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577374"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4204","reference_id":"CVE-2018-4204","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4204"},{"reference_url":"https://security.gentoo.org/glsa/201808-04","reference_id":"GLSA-201808-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201808-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"}],"fixed_packages":[],"aliases":["CVE-2018-4204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1u61-d4ch-eya4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83248?format=json","vulnerability_id":"VCID-29b3-s5n9-5fd8","summary":"poppler: out of bounds read in pdfunite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-13988","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70719","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74755","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.7471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74685","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-13988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602838","reference_id":"1602838","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1602838"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922","reference_id":"904922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3757-1/","reference_id":"USN-3757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3757-1/"}],"fixed_packages":[],"aliases":["CVE-2018-13988"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29b3-s5n9-5fd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73728?format=json","vulnerability_id":"VCID-9vuw-57ex-k7ez","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12910","reference_id":"","reference_type":"","scores":[{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88793","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88764","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04219","scoring_system":"epss","scoring_elements":"0.88794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07838","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047"},{"reference_url":"https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f"},{"reference_url":"https://gitlab.gnome.org/GNOME/libsoup/issues/3","reference_id":"","reference_type":"","scores":[],"url":"https://gitlab.gnome.org/GNOME/libsoup/issues/3"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/"},{"reference_url":"https://www.debian.org/security/2018/dsa-4241","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4241"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1597980","reference_id":"1597980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1597980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12910","reference_id":"CVE-2018-12910","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12910"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3701-1/","reference_id":"USN-3701-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3701-1/"}],"fixed_packages":[],"aliases":["CVE-2018-12910"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9vuw-57ex-k7ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83491?format=json","vulnerability_id":"VCID-kre4-9v6u-3ked","summary":"poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10768","reference_id":"","reference_type":"","scores":[{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.8308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83047","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83046","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10768"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=106408","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=106408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576169","reference_id":"1576169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576169"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10768","reference_id":"CVE-2018-10768","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3647-1/","reference_id":"USN-3647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3647-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10768"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kre4-9v6u-3ked"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83311?format=json","vulnerability_id":"VCID-p9ht-pahu-wbea","summary":"accountsservice: insufficient path check in user_change_icon_file_authorized_cb() in user.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14036.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14036","reference_id":"","reference_type":"","scores":[{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79188","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.7926","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01239","scoring_system":"epss","scoring_elements":"0.79257","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14036"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=107085","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=107085"},{"reference_url":"https://bugzilla.suse.com/show_bug.cgi?id=1099699","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.suse.com/show_bug.cgi?id=1099699"},{"reference_url":"https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a","reference_id":"","reference_type":"","scores":[],"url":"https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2018/07/02/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2018/07/02/2"},{"reference_url":"http://www.securityfocus.com/bid/104757","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104757"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601019","reference_id":"1601019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601019"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903828","reference_id":"903828","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903828"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14036","reference_id":"CVE-2018-14036","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14036"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/4616-1/","reference_id":"USN-4616-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4616-1/"},{"reference_url":"https://usn.ubuntu.com/4616-2/","reference_id":"USN-4616-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4616-2/"}],"fixed_packages":[],"aliases":["CVE-2018-14036"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p9ht-pahu-wbea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83892?format=json","vulnerability_id":"VCID-qjj9-dejh-vuaq","summary":"poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18267","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50793","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50848","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50887","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50929","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50891","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50935","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18267"},{"reference_url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=103238","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.freedesktop.org/show_bug.cgi?id=103238"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578777","reference_id":"1578777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1578777"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357","reference_id":"898357","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18267","reference_id":"CVE-2017-18267","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3647-1/","reference_id":"USN-3647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3647-1/"}],"fixed_packages":[],"aliases":["CVE-2017-18267"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjj9-dejh-vuaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83494?format=json","vulnerability_id":"VCID-qws2-p3ru-cbfw","summary":"libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10733.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10733.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10733","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73978","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74066","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.741","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74011","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73982","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74016","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74033","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74026","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74065","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74074","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10733"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1574844","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1574844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576111","reference_id":"1576111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576111"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897954","reference_id":"897954","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897954"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10733","reference_id":"CVE-2018-10733","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10733"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"}],"fixed_packages":[],"aliases":["CVE-2018-10733"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qws2-p3ru-cbfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=json","vulnerability_id":"VCID-tsw4-kqbc-kqf1","summary":"freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9381","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.722","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72331","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72326","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72201","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72294","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?45955","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?45955"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1752788","reference_id":"1752788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1752788"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9381","reference_id":"CVE-2015-9381","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4254","reference_id":"RHSA-2019:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4254"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[],"aliases":["CVE-2015-9381"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60916?format=json","vulnerability_id":"VCID-v9s7-7by8-dyeg","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11712","reference_id":"","reference_type":"","scores":[{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44113","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.43992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44078","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44183","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44187","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4417","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.44221","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11712"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=184804","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.webkit.org/show_bug.cgi?id=184804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://trac.webkit.org/changeset/230886/webkit","reference_id":"","reference_type":"","scores":[],"url":"https://trac.webkit.org/changeset/230886/webkit"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588742","reference_id":"1588742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588742"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11712","reference_id":"CVE-2018-11712","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11712"},{"reference_url":"https://security.gentoo.org/glsa/201808-04","reference_id":"GLSA-201808-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201808-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"}],"fixed_packages":[],"aliases":["CVE-2018-11712"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9s7-7by8-dyeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60917?format=json","vulnerability_id":"VCID-vvu1-fbux-z7bn","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11713","reference_id":"","reference_type":"","scores":[{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67915","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68067","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68052","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.6806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67938","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.6801","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.67976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00551","scoring_system":"epss","scoring_elements":"0.68026","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11713"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=126384","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.webkit.org/show_bug.cgi?id=126384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://trac.webkit.org/changeset/228088/webkit","reference_id":"","reference_type":"","scores":[],"url":"https://trac.webkit.org/changeset/228088/webkit"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588739","reference_id":"1588739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1588739"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11713","reference_id":"CVE-2018-11713","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11713"},{"reference_url":"https://security.gentoo.org/glsa/201808-04","reference_id":"GLSA-201808-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201808-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"}],"fixed_packages":[],"aliases":["CVE-2018-11713"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vvu1-fbux-z7bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60926?format=json","vulnerability_id":"VCID-x1zs-swgf-efd6","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst\n    of which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4121","reference_id":"","reference_type":"","scores":[{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97218","published_at":"2026-04-01T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.9723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.9724","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97259","published_at":"2026-04-26T12:55:00Z"},{"value":"0.3861","scoring_system":"epss","scoring_elements":"0.97261","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-4121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577387","reference_id":"1577387","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1577387"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1522","reference_id":"CVE-2018-4121","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1522"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt","reference_id":"CVE-2018-4121","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt"},{"reference_url":"https://security.gentoo.org/glsa/201808-04","reference_id":"GLSA-201808-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201808-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"}],"fixed_packages":[],"aliases":["CVE-2018-4121"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x1zs-swgf-efd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83492?format=json","vulnerability_id":"VCID-xddg-3n6n-t7gk","summary":"libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10767.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10767.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10767","reference_id":"","reference_type":"","scores":[{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74898","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74928","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7497","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74982","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10767"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575188","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575188"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576175","reference_id":"1576175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1576175"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898133","reference_id":"898133","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898133"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10767","reference_id":"CVE-2018-10767","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"}],"fixed_packages":[],"aliases":["CVE-2018-10767"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xddg-3n6n-t7gk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71801?format=json","vulnerability_id":"VCID-y1sm-7uec-1bc5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2862","reference_id":"","reference_type":"","scores":[{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90408","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90418","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90417","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90364","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05689","scoring_system":"epss","scoring_elements":"0.90381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07272","scoring_system":"epss","scoring_elements":"0.91671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07272","scoring_system":"epss","scoring_elements":"0.91677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07272","scoring_system":"epss","scoring_elements":"0.91675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07272","scoring_system":"epss","scoring_elements":"0.91673","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488817","reference_id":"1488817","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1488817"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552","reference_id":"874552","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://usn.ubuntu.com/3418-1/","reference_id":"USN-3418-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3418-1/"}],"fixed_packages":[],"aliases":["CVE-2017-2862"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y1sm-7uec-1bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=json","vulnerability_id":"VCID-ysfs-xxjz-vbep","summary":"freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9382","reference_id":"","reference_type":"","scores":[{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74063","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74014","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-9382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html"},{"reference_url":"https://savannah.nongnu.org/bugs/?45922","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.nongnu.org/bugs/?45922"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763609","reference_id":"1763609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1763609"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9382","reference_id":"CVE-2015-9382","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9382"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3140","reference_id":"RHSA-2018:3140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4254","reference_id":"RHSA-2019:4254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4254"},{"reference_url":"https://usn.ubuntu.com/4126-2/","reference_id":"USN-4126-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4126-2/"}],"fixed_packages":[],"aliases":["CVE-2015-9382"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/harfbuzz@1.7.5-2%3Farch=el7"}