Lookup for vulnerable packages by Package URL.

GET /api/packages/571180?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/571180?format=api",
    "purl": "pkg:deb/debian/pixman@0.10.0-2",
    "type": "deb",
    "namespace": "debian",
    "name": "pixman",
    "version": "0.10.0-2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "0.40.0-1.1~deb11u1",
    "latest_non_vulnerable_version": "0.40.0-1.1~deb11u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51448?format=api",
            "vulnerability_id": "VCID-3144-v9zj-7qat",
            "summary": "A vulnerability has been discovered in Pixman, which can lead to a heap buffer overflow.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44638.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-44638.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44638",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58733",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00367",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58715",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59294",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59333",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59318",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61719",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61736",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61743",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00416",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61697",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00438",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63183",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44638"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/05/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/11/05/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023427",
                    "reference_id": "1023427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023427"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139988",
                    "reference_id": "2139988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139988"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/pixman/pixman/-/issues/63",
                    "reference_id": "63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/pixman/pixman/-/issues/63"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/",
                    "reference_id": "AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/",
                    "reference_id": "BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5276",
                    "reference_id": "dsa-5276",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202407-04",
                    "reference_id": "GLSA-202407-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202407-04"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/",
                    "reference_id": "IUJ2BULJTZ2BMSKQHB6US674P55UCWWS",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00008.html",
                    "reference_id": "msg00008.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00008.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html",
                    "reference_id": "pixman-pixman_sample_floor_y-Integer-Overflow.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-02T19:11:57Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/170121/pixman-pixman_sample_floor_y-Integer-Overflow.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7375",
                    "reference_id": "RHSA-2023:7375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7386",
                    "reference_id": "RHSA-2023:7386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7386"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7403",
                    "reference_id": "RHSA-2023:7403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7531",
                    "reference_id": "RHSA-2023:7531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7531"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7754",
                    "reference_id": "RHSA-2023:7754",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7754"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0131",
                    "reference_id": "RHSA-2024:0131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0131"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2525",
                    "reference_id": "RHSA-2024:2525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2525"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5718-1/",
                    "reference_id": "USN-5718-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5718-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5718-2/",
                    "reference_id": "USN-5718-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5718-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051422?format=api",
                    "purl": "pkg:deb/debian/pixman@0.40.0-1.1~deb11u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.40.0-1.1~deb11u1"
                }
            ],
            "aliases": [
                "CVE-2022-44638"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3144-v9zj-7qat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59001?format=api",
            "vulnerability_id": "VCID-88p4-x2m8-ekbv",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9766.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9766.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94391",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94392",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94328",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94348",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94349",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94362",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94367",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94383",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.14144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94388",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9766"
                },
                {
                    "reference_url": "https://bugs.freedesktop.org/show_bug.cgi?id=69014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.freedesktop.org/show_bug.cgi?id=69014"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=972647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=972647"
                },
                {
                    "reference_url": "https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9766"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.freedesktop.org/archives/pixman/2014-April/003244.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.freedesktop.org/archives/pixman/2014-April/003244.html"
                },
                {
                    "reference_url": "https://lists.x.org/archives/xorg-announce/2014-July/002452.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.x.org/archives/xorg-announce/2014-July/002452.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3525",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3525"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/24/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/24/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/24/15",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/24/15"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2918-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2918-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311882",
                    "reference_id": "1311882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311882"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pixman:pixman:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:pixman:pixman:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pixman:pixman:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9766",
                    "reference_id": "CVE-2014-9766",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9766"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2918-1/",
                    "reference_id": "USN-2918-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2918-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571183?format=api",
                    "purl": "pkg:deb/debian/pixman@0.26.0-4%2Bdeb7u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3144-v9zj-7qat"
                        },
                        {
                            "vulnerability": "VCID-88p4-x2m8-ekbv"
                        },
                        {
                            "vulnerability": "VCID-vm7h-jwha-m7ch"
                        },
                        {
                            "vulnerability": "VCID-zpe1-47bs-nqev"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.26.0-4%252Bdeb7u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051419?format=api",
                    "purl": "pkg:deb/debian/pixman@0.32.6-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3144-v9zj-7qat"
                        },
                        {
                            "vulnerability": "VCID-zpe1-47bs-nqev"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.32.6-3"
                }
            ],
            "aliases": [
                "CVE-2014-9766"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88p4-x2m8-ekbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86991?format=api",
            "vulnerability_id": "VCID-8wuq-zw1n-33ae",
            "summary": "pixman: stack-based buffer overflow",
            "references": [
                {
                    "reference_url": "http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0687.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0687.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0746.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80463",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80439",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80445",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80328",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80335",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80343",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80372",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80383",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80386",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80379",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80408",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80409",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80413",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1591"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1591"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K51392553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.f5.com/csp/article/K51392553"
                },
                {
                    "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:116"
                },
                {
                    "reference_url": "http://www.palemoon.org/releasenotes-ng.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.palemoon.org/releasenotes-ng.shtml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700308",
                    "reference_id": "700308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700308"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=910149",
                    "reference_id": "910149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=910149"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:palemoon:pale_moon:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1591",
                    "reference_id": "CVE-2013-1591",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0687",
                    "reference_id": "RHSA-2013:0687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0687"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0746",
                    "reference_id": "RHSA-2013:0746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0746"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571183?format=api",
                    "purl": "pkg:deb/debian/pixman@0.26.0-4%2Bdeb7u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3144-v9zj-7qat"
                        },
                        {
                            "vulnerability": "VCID-88p4-x2m8-ekbv"
                        },
                        {
                            "vulnerability": "VCID-vm7h-jwha-m7ch"
                        },
                        {
                            "vulnerability": "VCID-zpe1-47bs-nqev"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.26.0-4%252Bdeb7u2"
                }
            ],
            "aliases": [
                "CVE-2013-1591"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8wuq-zw1n-33ae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36936?format=api",
            "vulnerability_id": "VCID-vm7h-jwha-m7ch",
            "summary": "An integer underflow vulnerability in Pixman may allow a\n    context-dependent attacker to cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6425.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6425.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.865",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86511",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86529",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86528",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86548",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86557",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86572",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86569",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86562",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86581",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86592",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.866",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02998",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86599",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6425"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6425"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1037975",
                    "reference_id": "1037975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1037975"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201402-03",
                    "reference_id": "GLSA-201402-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201402-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1869",
                    "reference_id": "RHSA-2013:1869",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1869"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571183?format=api",
                    "purl": "pkg:deb/debian/pixman@0.26.0-4%2Bdeb7u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3144-v9zj-7qat"
                        },
                        {
                            "vulnerability": "VCID-88p4-x2m8-ekbv"
                        },
                        {
                            "vulnerability": "VCID-vm7h-jwha-m7ch"
                        },
                        {
                            "vulnerability": "VCID-zpe1-47bs-nqev"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.26.0-4%252Bdeb7u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051419?format=api",
                    "purl": "pkg:deb/debian/pixman@0.32.6-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3144-v9zj-7qat"
                        },
                        {
                            "vulnerability": "VCID-zpe1-47bs-nqev"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.32.6-3"
                }
            ],
            "aliases": [
                "CVE-2013-6425"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vm7h-jwha-m7ch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85526?format=api",
            "vulnerability_id": "VCID-zpe1-47bs-nqev",
            "summary": "pixman: general_composite_rect() integer overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5297.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5297.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59715",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59788",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59812",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59782",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59833",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59867",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59851",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59832",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5987",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59877",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59863",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59837",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5297"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5297"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651585",
                    "reference_id": "1651585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3843-1/",
                    "reference_id": "USN-3843-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3843-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3843-2/",
                    "reference_id": "USN-3843-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3843-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051420?format=api",
                    "purl": "pkg:deb/debian/pixman@0.34.0-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3144-v9zj-7qat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.34.0-1"
                }
            ],
            "aliases": [
                "CVE-2015-5297"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpe1-47bs-nqev"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/pixman@0.10.0-2"
}