{"url":"http://public2.vulnerablecode.io/api/packages/130437?format=json","purl":"pkg:rpm/redhat/openmotif@2.2.3-4.RHEL3?arch=4","type":"rpm","namespace":"redhat","name":"openmotif","version":"2.2.3-4.RHEL3","qualifiers":{"arch":"4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89420?format=json","vulnerability_id":"VCID-e847-axx8-guct","summary":"openmotif21 stack overflows in libxpm","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2004-537.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2004-537.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0914.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0914","reference_id":"","reference_type":"","scores":[{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84308","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84241","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84271","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84295","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84301","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02166","scoring_system":"epss","scoring_elements":"0.84312","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0914"},{"reference_url":"http://secunia.com/advisories/13224/","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/13224/"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18142","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18142"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18144","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18144"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18145","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18145"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18146","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18146"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18147","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18147"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943"},{"reference_url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228","reference_id":"","reference_type":"","scores":[],"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228"},{"reference_url":"http://www.debian.org/security/2004/dsa-607","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-607"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200411-28.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200411-28.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200502-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200502-06.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml"},{"reference_url":"http://www.linuxsecurity.com/content/view/106877/102/","reference_id":"","reference_type":"","scores":[],"url":"http://www.linuxsecurity.com/content/view/106877/102/"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:137","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:137"},{"reference_url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2004-610.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2004-610.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-004.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-004.html"},{"reference_url":"http://www.securityfocus.com/bid/11694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11694"},{"reference_url":"http://www.ubuntu.com/usn/usn-83-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-83-1"},{"reference_url":"http://www.ubuntu.com/usn/usn-83-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-83-2"},{"reference_url":"http://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patch","reference_id":"","reference_type":"","scores":[],"url":"http://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patch"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=430516","reference_id":"430516","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=430516"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.94:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.94:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.94:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.96:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lesstif:lesstif:0.93.96:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lesstif:lesstif:0.93.96:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:3.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:3.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:3.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:3.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.0.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:errata:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:errata:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:errata:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11r6:6.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11r6:6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:x11r6:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0914","reference_id":"CVE-2004-0914","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:537","reference_id":"RHSA-2004:537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:610","reference_id":"RHSA-2004:610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:612","reference_id":"RHSA-2004:612","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:004","reference_id":"RHSA-2005:004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:004"},{"reference_url":"https://usn.ubuntu.com/83-1/","reference_id":"USN-83-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/83-1/"},{"reference_url":"https://usn.ubuntu.com/83-2/","reference_id":"USN-83-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/83-2/"}],"fixed_packages":[],"aliases":["CVE-2004-0914"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e847-axx8-guct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89419?format=json","vulnerability_id":"VCID-rgqm-umh2-pkc2","summary":"openmotif21 stack overflows in libxpm","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0688.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0688.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0688","reference_id":"","reference_type":"","scores":[{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.9476","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.9477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94781","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16028","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0688"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=430515","reference_id":"430515","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=430515"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:478","reference_id":"RHSA-2004:478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:479","reference_id":"RHSA-2004:479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:537","reference_id":"RHSA-2004:537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:004","reference_id":"RHSA-2005:004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:004"},{"reference_url":"https://usn.ubuntu.com/27-1/","reference_id":"USN-27-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/27-1/"}],"fixed_packages":[],"aliases":["CVE-2004-0688"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rgqm-umh2-pkc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89399?format=json","vulnerability_id":"VCID-y3e9-1986-ebdn","summary":"openmotif21 stack overflows in libxpm","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0687.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0687.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0687","reference_id":"","reference_type":"","scores":[{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95755","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95775","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95783","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95786","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.9579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22103","scoring_system":"epss","scoring_elements":"0.95791","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0687"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=430513","reference_id":"430513","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=430513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:478","reference_id":"RHSA-2004:478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:479","reference_id":"RHSA-2004:479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:537","reference_id":"RHSA-2004:537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:004","reference_id":"RHSA-2005:004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:004"},{"reference_url":"https://usn.ubuntu.com/27-1/","reference_id":"USN-27-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/27-1/"}],"fixed_packages":[],"aliases":["CVE-2004-0687"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3e9-1986-ebdn"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openmotif@2.2.3-4.RHEL3%3Farch=4"}