Lookup for vulnerable packages by Package URL.

GET /api/packages/571412?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/571412?format=api",
    "purl": "pkg:deb/debian/hplip@1.6.10-3etch1",
    "type": "deb",
    "namespace": "debian",
    "name": "hplip",
    "version": "1.6.10-3etch1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "3.21.2+dfsg1-2",
    "latest_non_vulnerable_version": "3.21.2+dfsg1-2",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34784?format=api",
            "vulnerability_id": "VCID-8e1n-19ca-ayb4",
            "summary": "A vulnerability in foomatic-filters could result in the execution\n    of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90122",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90124",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90136",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90141",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90163",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90165",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90183",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90182",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90179",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90193",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9019",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90202",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90217",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.05428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90228",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2697"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549",
                    "reference_id": "635549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001",
                    "reference_id": "721001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721001"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-07",
                    "reference_id": "GLSA-201203-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1109",
                    "reference_id": "RHSA-2011:1109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1109"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1194-1/",
                    "reference_id": "USN-1194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1194-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571414?format=api",
                    "purl": "pkg:deb/debian/hplip@3.10.6-2%2Bsqueeze2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f2yg-yaaj-uub1"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        },
                        {
                            "vulnerability": "VCID-y2pa-cbhj-r7az"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.10.6-2%252Bsqueeze2"
                }
            ],
            "aliases": [
                "CVE-2011-2697"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8e1n-19ca-ayb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88386?format=api",
            "vulnerability_id": "VCID-a7h1-7a1g-vqa6",
            "summary": "hplip hpssd.py Denial-Of-Service parsing vulnerability",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2941.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2941.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1061",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10383",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10564",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10428",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10502",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10568",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10598",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10542",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10409",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10392",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10522",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10508",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10507",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10454",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10407",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10543",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2941"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31470"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31499"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32316"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32792"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020683"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44440"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30683"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-674-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-674-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-674-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-674-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457052",
                    "reference_id": "457052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457052"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842",
                    "reference_id": "499842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2941",
                    "reference_id": "CVE-2008-2941",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2941"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0818",
                    "reference_id": "RHSA-2008:0818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0818"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/674-1/",
                    "reference_id": "USN-674-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/674-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/674-2/",
                    "reference_id": "USN-674-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/674-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571413?format=api",
                    "purl": "pkg:deb/debian/hplip@2.8.6.b-4%2Blenny1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8e1n-19ca-ayb4"
                        },
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f2yg-yaaj-uub1"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        },
                        {
                            "vulnerability": "VCID-mfqk-y4g4-sfa5"
                        },
                        {
                            "vulnerability": "VCID-y2pa-cbhj-r7az"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6.b-4%252Blenny1"
                }
            ],
            "aliases": [
                "CVE-2008-2941"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a7h1-7a1g-vqa6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54453?format=api",
            "vulnerability_id": "VCID-ajy8-wz5n-mfb2",
            "summary": "several",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6402.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6402.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1814",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18052",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1819",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18195",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18148",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18097",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18039",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18051",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18085",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17993",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17969",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17932",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17788",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1788",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17984",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035243",
                    "reference_id": "1035243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035243"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725876",
                    "reference_id": "725876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725876"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2085-1/",
                    "reference_id": "USN-2085-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2085-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api",
                    "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050734?format=api",
                    "purl": "pkg:deb/debian/hplip@3.14.6-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.14.6-1"
                }
            ],
            "aliases": [
                "CVE-2013-6402"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ajy8-wz5n-mfb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47336?format=api",
            "vulnerability_id": "VCID-cnxw-4ree-g3ez",
            "summary": "The hpssd daemon might allow local attackers to execute arbitrary commands\n    with root privileges.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98802",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98805",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98809",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98812",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98813",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98814",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98818",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98819",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98822",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98825",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98826",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98829",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98831",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.73689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98834",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5208"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=319921",
                    "reference_id": "319921",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=319921"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447341",
                    "reference_id": "447341",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447341"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16837.rb",
                    "reference_id": "CVE-2007-5208;OSVDB-41693",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/16837.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200710-26",
                    "reference_id": "GLSA-200710-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200710-26"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2007:0960",
                    "reference_id": "RHSA-2007:0960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2007:0960"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/530-1/",
                    "reference_id": "USN-530-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/530-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571413?format=api",
                    "purl": "pkg:deb/debian/hplip@2.8.6.b-4%2Blenny1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8e1n-19ca-ayb4"
                        },
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f2yg-yaaj-uub1"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        },
                        {
                            "vulnerability": "VCID-mfqk-y4g4-sfa5"
                        },
                        {
                            "vulnerability": "VCID-y2pa-cbhj-r7az"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6.b-4%252Blenny1"
                }
            ],
            "aliases": [
                "CVE-2007-5208"
            ],
            "risk_score": 1.4,
            "exploitability": "2.0",
            "weighted_severity": "0.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnxw-4ree-g3ez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45765?format=api",
            "vulnerability_id": "VCID-e7ce-ncn2-87dd",
            "summary": "A race condition in polkit could allow a local attacker to gain\n    escalated privileges.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4325.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20143",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20291",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20348",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20072",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20211",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2019",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20132",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20124",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20129",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20128",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20012",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20006",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19977",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19884",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19961",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20048",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674",
                    "reference_id": "1006674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006674"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716",
                    "reference_id": "723716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=723716"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-27",
                    "reference_id": "GLSA-201406-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1274",
                    "reference_id": "RHSA-2013:1274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1274"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1956-1/",
                    "reference_id": "USN-1956-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1956-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api",
                    "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050734?format=api",
                    "purl": "pkg:deb/debian/hplip@3.14.6-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.14.6-1"
                }
            ],
            "aliases": [
                "CVE-2013-4325"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7ce-ncn2-87dd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49322?format=api",
            "vulnerability_id": "VCID-f2yg-yaaj-uub1",
            "summary": "Multiple vulnerabilities have been found in HPLIP, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21346",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21513",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21572",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21327",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21405",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21467",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21478",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21439",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21378",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21386",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21354",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21207",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21205",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21182",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21085",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21153",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21241",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549",
                    "reference_id": "635549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635549"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=725830",
                    "reference_id": "725830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=725830"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-17",
                    "reference_id": "GLSA-201203-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-17"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0133",
                    "reference_id": "RHSA-2013:0133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0133"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0500",
                    "reference_id": "RHSA-2013:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1981-1/",
                    "reference_id": "USN-1981-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1981-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api",
                    "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1"
                }
            ],
            "aliases": [
                "CVE-2011-2722"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f2yg-yaaj-uub1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85637?format=api",
            "vulnerability_id": "VCID-f39n-wae1-n3cc",
            "summary": "hplip: hp-plugin verified binary download with short key ID",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50358",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5035",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50273",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50326",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5037",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50424",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50417",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50458",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5042",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50463",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50444",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5039",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50399",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65788",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65818",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65739",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0839"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227252",
                    "reference_id": "1227252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227252"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787353",
                    "reference_id": "787353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787353"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2699-1/",
                    "reference_id": "USN-2699-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2699-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1051427?format=api",
                    "purl": "pkg:deb/debian/hplip@3.16.11%2Brepack0-1~bpo8%2B1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.16.11%252Brepack0-1~bpo8%252B1"
                }
            ],
            "aliases": [
                "CVE-2015-0839"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f39n-wae1-n3cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88385?format=api",
            "vulnerability_id": "VCID-f3w3-w65v-hyhm",
            "summary": "hpssd of hplip allows unprivileged user to trigger alert mail",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2940.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2940.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13428",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13449",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13548",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13611",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13407",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13488",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13537",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1351",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13473",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13427",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13333",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13414",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13418",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13392",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13287",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13188",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13343",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2940"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2940"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31470"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31499"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32316"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32792"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1020684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1020684"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44441"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:169"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0818.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30683"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-674-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-674-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-674-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-674-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=455235",
                    "reference_id": "455235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=455235"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842",
                    "reference_id": "499842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499842"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2940",
                    "reference_id": "CVE-2008-2940",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2940"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0818",
                    "reference_id": "RHSA-2008:0818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0818"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/674-1/",
                    "reference_id": "USN-674-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/674-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/674-2/",
                    "reference_id": "USN-674-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/674-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571413?format=api",
                    "purl": "pkg:deb/debian/hplip@2.8.6.b-4%2Blenny1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8e1n-19ca-ayb4"
                        },
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f2yg-yaaj-uub1"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        },
                        {
                            "vulnerability": "VCID-mfqk-y4g4-sfa5"
                        },
                        {
                            "vulnerability": "VCID-y2pa-cbhj-r7az"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@2.8.6.b-4%252Blenny1"
                }
            ],
            "aliases": [
                "CVE-2008-2940"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f3w3-w65v-hyhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94623?format=api",
            "vulnerability_id": "VCID-k8hw-71wj-dygy",
            "summary": "The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17974",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1778",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17872",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18129",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18337",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1804",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18179",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18186",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18138",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18089",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18032",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18044",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18078",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17987",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17964",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17927",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-6923"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6923"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.hp.com/us-en/document/c06927115",
                    "reference_id": "c06927115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-20T16:45:04Z/"
                        }
                    ],
                    "url": "https://support.hp.com/us-en/document/c06927115"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7202-1/",
                    "reference_id": "USN-7202-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7202-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052335?format=api",
                    "purl": "pkg:deb/debian/hplip@3.21.2%2Bdfsg1-2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.21.2%252Bdfsg1-2"
                }
            ],
            "aliases": [
                "CVE-2020-6923"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8hw-71wj-dygy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54454?format=api",
            "vulnerability_id": "VCID-m5z3-fsqw-nue1",
            "summary": "several",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6427.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6427.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73636",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73645",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73669",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73642",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73677",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7369",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73711",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73694",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73685",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73728",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73761",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7377",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73763",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73789",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73813",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6427"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1038434",
                    "reference_id": "1038434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1038434"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731480",
                    "reference_id": "731480",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731480"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2085-1/",
                    "reference_id": "USN-2085-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2085-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api",
                    "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050734?format=api",
                    "purl": "pkg:deb/debian/hplip@3.14.6-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.14.6-1"
                }
            ],
            "aliases": [
                "CVE-2013-6427"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5z3-fsqw-nue1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49321?format=api",
            "vulnerability_id": "VCID-mfqk-y4g4-sfa5",
            "summary": "Multiple vulnerabilities have been found in HPLIP, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053472.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053474.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
                },
                {
                    "reference_url": "http://osvdb.org/70498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/70498"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4267.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.932",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9311",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93123",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93122",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9313",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93135",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9314",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93139",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93155",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9316",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93173",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93172",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93169",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93175",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.10217",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9319",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4267"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/attachment.cgi?id=468455&action=diff"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42939"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42956"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43022"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43068"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43083"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43102"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48441"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201203-17.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201203-17.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64738"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2152"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:013"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0154.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0154.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/45833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/45833"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1024967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1024967"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1051-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1051-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0136"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0160",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0160"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0211",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0211"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0212",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0212"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0228"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0243"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960",
                    "reference_id": "610960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610960"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=662740",
                    "reference_id": "662740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662740"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4267",
                    "reference_id": "CVE-2010-4267",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4267"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-17",
                    "reference_id": "GLSA-201203-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-17"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0154",
                    "reference_id": "RHSA-2011:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1051-1/",
                    "reference_id": "USN-1051-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1051-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571414?format=api",
                    "purl": "pkg:deb/debian/hplip@3.10.6-2%2Bsqueeze2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f2yg-yaaj-uub1"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        },
                        {
                            "vulnerability": "VCID-y2pa-cbhj-r7az"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.10.6-2%252Bsqueeze2"
                }
            ],
            "aliases": [
                "CVE-2010-4267"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfqk-y4g4-sfa5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54452?format=api",
            "vulnerability_id": "VCID-y2pa-cbhj-r7az",
            "summary": "several",
            "references": [
                {
                    "reference_url": "ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm"
                },
                {
                    "reference_url": "http://hplipopensource.com/hplip-web/release_notes.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hplipopensource.com/hplip-web/release_notes.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0200.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0200.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22672",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22594",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22758",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22973",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22765",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2284",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22914",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22877",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22821",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22834",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22829",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22789",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22628",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2262",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22616",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22511",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427"
                },
                {
                    "reference_url": "http://secunia.com/advisories/55083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/55083"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072"
                },
                {
                    "reference_url": "http://www.debian.org/security/2013/dsa-2829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2013/dsa-2829"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:088"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1981-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1981-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701185",
                    "reference_id": "701185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701185"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=902163",
                    "reference_id": "902163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=902163"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:2.7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.10.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.3a:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.11.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.4b:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:linux_imaging_and_printing_project:3.9.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0200",
                    "reference_id": "CVE-2013-0200",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0200"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0500",
                    "reference_id": "RHSA-2013:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1981-1/",
                    "reference_id": "USN-1981-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1981-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571415?format=api",
                    "purl": "pkg:deb/debian/hplip@3.12.6-3.1%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-ajy8-wz5n-mfb2"
                        },
                        {
                            "vulnerability": "VCID-e7ce-ncn2-87dd"
                        },
                        {
                            "vulnerability": "VCID-f39n-wae1-n3cc"
                        },
                        {
                            "vulnerability": "VCID-k8hw-71wj-dygy"
                        },
                        {
                            "vulnerability": "VCID-m5z3-fsqw-nue1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@3.12.6-3.1%252Bdeb7u1"
                }
            ],
            "aliases": [
                "CVE-2013-0200"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2pa-cbhj-r7az"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "3.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/hplip@1.6.10-3etch1"
}