Lookup for vulnerable packages by Package URL.

GET /api/packages/571555?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
    "type": "deb",
    "namespace": "debian",
    "name": "cups",
    "version": "1.5.3-5+deb7u6",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.4.18-1",
    "latest_non_vulnerable_version": "2.4.18-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80613?format=api",
            "vulnerability_id": "VCID-2chf-23mc-d3dn",
            "summary": "cups: access to uninitialized buffer in ipp.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10001.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24831",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24951",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24726",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24793",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24838",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24852",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24813",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24767",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24759",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24736",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24675",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24663",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24618",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24495",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24573",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24637",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10001"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10001"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921680",
                    "reference_id": "1921680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921680"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-13",
                    "reference_id": "ASA-202102-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1529",
                    "reference_id": "AVG-1529",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1529"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4393",
                    "reference_id": "RHSA-2021:4393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4393"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5454-1/",
                    "reference_id": "USN-5454-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5454-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5454-2/",
                    "reference_id": "USN-5454-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5454-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2020-10001"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=api",
            "vulnerability_id": "VCID-35gf-189e-3ud4",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15256",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15306",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15412",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15317",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15126",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15133",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15191",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1523",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15228",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15172",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15037",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15162",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cups.org/str.php?L4455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cups.org/str.php?L4455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60509"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2990"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2341-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2341-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600",
                    "reference_id": "1122600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029",
                    "reference_id": "CVE-2014-5029",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2341-1/",
                    "reference_id": "USN-2341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-5029"
            ],
            "risk_score": 0.7,
            "exploitability": "0.5",
            "weighted_severity": "1.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=api",
            "vulnerability_id": "VCID-3ame-feez-yqhc",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99181",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99188",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99189",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9919",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99193",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99195",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99198",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.992",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99202",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641",
                    "reference_id": "1221641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641"
                },
                {
                    "reference_url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py",
                    "reference_id": "CVE-2015-1158",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py",
                    "reference_id": "CVE-2015-1158",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py"
                },
                {
                    "reference_url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html",
                    "reference_id": "CVE-2015-1158;OSVDB-123116",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt",
                    "reference_id": "CVE-2015-1158;OSVDB-123116",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-07",
                    "reference_id": "GLSA-201510-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123",
                    "reference_id": "RHSA-2015:1123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1123"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2629-1/",
                    "reference_id": "USN-2629-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2629-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"
                }
            ],
            "aliases": [
                "CVE-2015-1158"
            ],
            "risk_score": 1.4,
            "exploitability": "2.0",
            "weighted_severity": "0.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68013?format=api",
            "vulnerability_id": "VCID-3etj-2m21-ffa1",
            "summary": "cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58364.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30003",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29955",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31552",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32467",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32388",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32429",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32402",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32439",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32668",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32735",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32857",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32875",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32781",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078",
                    "reference_id": "2393078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393078"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d",
                    "reference_id": "e58cba9d6fceed4242980e51dbd1302cf638ab1d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4",
                    "reference_id": "GHSA-7qx3-r744-6qv4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-11T17:37:26Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15700",
                    "reference_id": "RHSA-2025:15700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15700"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15701",
                    "reference_id": "RHSA-2025:15701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16590",
                    "reference_id": "RHSA-2025:16590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16591",
                    "reference_id": "RHSA-2025:16591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16592",
                    "reference_id": "RHSA-2025:16592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22063",
                    "reference_id": "RHSA-2025:22063",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22063"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814",
                    "reference_id": "RHSA-2026:8814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8814"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7745-1/",
                    "reference_id": "USN-7745-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7745-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api",
                    "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9"
                }
            ],
            "aliases": [
                "CVE-2025-58364"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94280?format=api",
            "vulnerability_id": "VCID-44ju-8618-vqht",
            "summary": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57666",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57528",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57612",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57609",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57663",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57667",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57682",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57661",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57641",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57671",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57645",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57603",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57623",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57602",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57558",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8842"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5454-1/",
                    "reference_id": "USN-5454-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5454-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5454-2/",
                    "reference_id": "USN-5454-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5454-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2019-8842"
            ],
            "risk_score": 0.7,
            "exploitability": "0.5",
            "weighted_severity": "1.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82676?format=api",
            "vulnerability_id": "VCID-6mus-21kz-uuhz",
            "summary": "cups: Session cookie generated by the CUPS web interface is easy to guess",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4300.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.593",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59226",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59263",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59268",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5925",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59231",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59251",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59238",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59195",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59243",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65682",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65554",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65649",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65668",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65632",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65598",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4300"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apple/cups/releases/tag/v2.2.10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apple/cups/releases/tag/v2.2.10"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00028.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/107785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/107785"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695929",
                    "reference_id": "1695929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695929"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909",
                    "reference_id": "915909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=915909"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4300",
                    "reference_id": "CVE-2018-4300",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4300"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050",
                    "reference_id": "RHSA-2020:1050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1050"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2018-4300"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78840?format=api",
            "vulnerability_id": "VCID-7wg4-sc9v-bffk",
            "summary": "cups: Information leak through Cups-Get-Document operation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32360.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20097",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20037",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19884",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19963",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20017",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19992",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19934",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19917",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19921",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22605",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22537",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22443",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22526",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22539",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22548",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22709",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32360"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953",
                    "reference_id": "1051953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051953"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230495",
                    "reference_id": "2230495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230495"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213758",
                    "reference_id": "HT213758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213758"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213759",
                    "reference_id": "HT213759",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213759"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213760",
                    "reference_id": "HT213760",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"
                        }
                    ],
                    "url": "https://support.apple.com/en-us/HT213760"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html",
                    "reference_id": "msg00041.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-05T16:47:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4765",
                    "reference_id": "RHSA-2023:4765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4766",
                    "reference_id": "RHSA-2023:4766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4768",
                    "reference_id": "RHSA-2023:4768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4768"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4769",
                    "reference_id": "RHSA-2023:4769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4770",
                    "reference_id": "RHSA-2023:4770",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4770"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4771",
                    "reference_id": "RHSA-2023:4771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4838",
                    "reference_id": "RHSA-2023:4838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4864",
                    "reference_id": "RHSA-2023:4864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6361-1/",
                    "reference_id": "USN-6361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6361-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6361-2/",
                    "reference_id": "USN-6361-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6361-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2023-32360"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68012?format=api",
            "vulnerability_id": "VCID-993k-m3sq-gufu",
            "summary": "cups: Authentication Bypass in CUPS Authorization Handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58060.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15401",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16263",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16433",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16325",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16323",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16279",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16147",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16411",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16496",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16551",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16532",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16494",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16436",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16376",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16395",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58060"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595",
                    "reference_id": "2392595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392595"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221",
                    "reference_id": "595d691075b1d396d2edfaa0a8fd0873a0a1f221",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq",
                    "reference_id": "GHSA-4c68-qgrh-rmmq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-09-11T17:33:32Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15700",
                    "reference_id": "RHSA-2025:15700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15700"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15701",
                    "reference_id": "RHSA-2025:15701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:15702",
                    "reference_id": "RHSA-2025:15702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:15702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16590",
                    "reference_id": "RHSA-2025:16590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16591",
                    "reference_id": "RHSA-2025:16591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:16592",
                    "reference_id": "RHSA-2025:16592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:16592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17049",
                    "reference_id": "RHSA-2025:17049",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17049"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17054",
                    "reference_id": "RHSA-2025:17054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17141",
                    "reference_id": "RHSA-2025:17141",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17141"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17144",
                    "reference_id": "RHSA-2025:17144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17144"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:17164",
                    "reference_id": "RHSA-2025:17164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:17164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934",
                    "reference_id": "RHSA-2026:0934",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0934"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814",
                    "reference_id": "RHSA-2026:8814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8814"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7745-1/",
                    "reference_id": "USN-7745-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7745-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api",
                    "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9"
                }
            ],
            "aliases": [
                "CVE-2025-58060"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73815?format=api",
            "vulnerability_id": "VCID-am36-6m5v-fkba",
            "summary": "cups: libppd: remote command injection via attacker controlled data in PPD file",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47175.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47175",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96927",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96878",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96883",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96895",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96897",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96898",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96905",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96909",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96919",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.33103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96923",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.33659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96918",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.33659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96955",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.33659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96957",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47175"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256",
                    "reference_id": "2314256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314256"
                },
                {
                    "reference_url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I",
                    "reference_id": "Attacking-UNIX-systems-via-CUPS-Part-I",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"
                        }
                    ],
                    "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6",
                    "reference_id": "GHSA-7xfx-47qg-grp6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47",
                    "reference_id": "GHSA-p9rh-jxmq-gq47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8",
                    "reference_id": "GHSA-rj88-6mr5-rcw8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5",
                    "reference_id": "GHSA-w63j-6g73-wmg5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7346",
                    "reference_id": "RHSA-2024:7346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7461",
                    "reference_id": "RHSA-2024:7461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7461"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7462",
                    "reference_id": "RHSA-2024:7462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7463",
                    "reference_id": "RHSA-2024:7463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7503",
                    "reference_id": "RHSA-2024:7503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7504",
                    "reference_id": "RHSA-2024:7504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7506",
                    "reference_id": "RHSA-2024:7506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7551",
                    "reference_id": "RHSA-2024:7551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7553",
                    "reference_id": "RHSA-2024:7553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7623",
                    "reference_id": "RHSA-2024:7623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9470",
                    "reference_id": "RHSA-2024:9470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9470"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0083",
                    "reference_id": "RHSA-2025:0083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0083"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7041-1/",
                    "reference_id": "USN-7041-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7041-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7041-2/",
                    "reference_id": "USN-7041-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7041-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7041-3/",
                    "reference_id": "USN-7041-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7041-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7045-1/",
                    "reference_id": "USN-7045-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7045-1/"
                },
                {
                    "reference_url": "https://www.cups.org",
                    "reference_id": "www.cups.org",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/"
                        }
                    ],
                    "url": "https://www.cups.org"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584494?format=api",
                    "purl": "pkg:deb/debian/cups@2.4.2-3%2Bdeb12u9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.4.2-3%252Bdeb12u9"
                }
            ],
            "aliases": [
                "CVE-2024-47175"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=api",
            "vulnerability_id": "VCID-anr5-gc12-e7dr",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16598",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16637",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16867",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16652",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16737",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16771",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16727",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16606",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16614",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16653",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16544",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16509",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16374",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16493",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/59945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/59945"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60273"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT6535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/kb/HT6535"
                },
                {
                    "reference_url": "http://www.cups.org/blog.php?L724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cups.org/blog.php?L724"
                },
                {
                    "reference_url": "http://www.cups.org/str.php?L4450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cups.org/str.php?L4450"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/68788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/68788"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1030611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1030611"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2293-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2293-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576",
                    "reference_id": "1115576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537",
                    "reference_id": "CVE-2014-3537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2293-1/",
                    "reference_id": "USN-2293-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2293-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-3537"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94174?format=api",
            "vulnerability_id": "VCID-apyh-1uza-pffa",
            "summary": "In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28106",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28179",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28222",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28017",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28084",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28128",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28134",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28091",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28043",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27978",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27895",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27783",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27707",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27536",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27597",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2762",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2228"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2228"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782",
                    "reference_id": "946782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946782"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4340-1/",
                    "reference_id": "USN-4340-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4340-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2019-2228"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31916?format=api",
            "vulnerability_id": "VCID-aznw-8yer-xfhf",
            "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09741",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0979",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09768",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09785",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09807",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09686",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10737",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11703",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1158",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11662",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1147",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11548",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11622",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17257",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17165",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/26/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/06/26/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/23/10",
                    "reference_id": "10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/06/23/10"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885",
                    "reference_id": "1038885",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1038885"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214914",
                    "reference_id": "2214914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214914"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/",
                    "reference_id": "7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2",
                    "reference_id": "9809947a959e18409dcf562a3466ef246cb90cb2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25",
                    "reference_id": "GHSA-qjgh-5hcq-5f25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-qjgh-5hcq-5f25"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-17",
                    "reference_id": "GLSA-202402-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-17"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213843",
                    "reference_id": "HT213843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213843"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213844",
                    "reference_id": "HT213844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213844"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213845",
                    "reference_id": "HT213845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213845"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6596",
                    "reference_id": "RHSA-2023:6596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6596"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7165",
                    "reference_id": "RHSA-2023:7165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1101",
                    "reference_id": "RHSA-2024:1101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1409",
                    "reference_id": "RHSA-2024:1409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1409"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/",
                    "reference_id": "TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6184-1/",
                    "reference_id": "USN-6184-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6184-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6184-2/",
                    "reference_id": "USN-6184-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6184-2/"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.6",
                    "reference_id": "v2.4.6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-10T20:49:43Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.6"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2023-34241"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34381?format=api",
            "vulnerability_id": "VCID-bzht-vhe3-y7bf",
            "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4180.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29812",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30176",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30171",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30128",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30056",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29941",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29872",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29735",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29801",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40939",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4095",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40957",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40864",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40946",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.409",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html"
                },
                {
                    "reference_url": "https://support.apple.com/HT208849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208849"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4243"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607282",
                    "reference_id": "1607282",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607282"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4180",
                    "reference_id": "CVE-2018-4180",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4180"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-08",
                    "reference_id": "GLSA-201908-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050",
                    "reference_id": "RHSA-2020:1050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1050"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3713-1/",
                    "reference_id": "USN-3713-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3713-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2018-4180"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86391?format=api",
            "vulnerability_id": "VCID-cf81-58ju-bqaz",
            "summary": "cups: cross-site scripting flaw fixed in the 1.7.2 release",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2856.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77324",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77359",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7734",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7737",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77379",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77406",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77385",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77382",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77422",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77414",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77448",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77456",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77467",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77475",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77502",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77525",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087122",
                    "reference_id": "1087122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1087122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2172-1/",
                    "reference_id": "USN-2172-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2172-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-2856"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cf81-58ju-bqaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81400?format=api",
            "vulnerability_id": "VCID-ev9c-v5dv-37fb",
            "summary": "cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37102",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37269",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37296",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37125",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37177",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3719",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37201",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37167",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37185",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37111",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36887",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36855",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36649",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36717",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36741",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823964",
                    "reference_id": "1823964",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823964"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4469",
                    "reference_id": "RHSA-2020:4469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4469"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4340-1/",
                    "reference_id": "USN-4340-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4340-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2020-3898"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=api",
            "vulnerability_id": "VCID-fby6-8f6z-63fw",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16117",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16109",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16292",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16354",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16239",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16304",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16286",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16134",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16061",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16059",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16021",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15902",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16015",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cups.org/str.php?L4455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cups.org/str.php?L4455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60509"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2990"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2341-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2341-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764",
                    "reference_id": "1128764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030",
                    "reference_id": "CVE-2014-5030",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2341-1/",
                    "reference_id": "USN-2341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-5030"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83888?format=api",
            "vulnerability_id": "VCID-fkyp-m1p9-mfhy",
            "summary": "cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18248.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18248",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76945",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76951",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7698",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76994",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77006",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77034",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77012",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77009",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7705",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77052",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77044",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77079",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77086",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.771",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77108",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77137",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77159",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18248"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18248"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561296",
                    "reference_id": "1561296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561296"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3713-1/",
                    "reference_id": "USN-3713-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3713-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2017-18248"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75351?format=api",
            "vulnerability_id": "VCID-k4yw-jg6v-1bcc",
            "summary": "cups: Cupsd Listen arbitrary chmod 0140777",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-35235.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8689",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86756",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86776",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86773",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86793",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86815",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86811",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86807",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86822",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86826",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86825",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86841",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86848",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86872",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-35235"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/11/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/06/11/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002",
                    "reference_id": "1073002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073002"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290318",
                    "reference_id": "2290318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2290318"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/12/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/06/12/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/06/12/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/06/12/5"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d",
                    "reference_id": "ff1f8a623e090dee8a8aadf12a6a4b25efac143d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f",
                    "reference_id": "GHSA-vvwp-mv6j-hw6f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240",
                    "reference_id": "http-addr.c#L229-L240",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html",
                    "reference_id": "msg00001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4265",
                    "reference_id": "RHSA-2024:4265",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4265"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4580",
                    "reference_id": "RHSA-2024:4580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4580"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4715",
                    "reference_id": "RHSA-2024:4715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4715"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4776",
                    "reference_id": "RHSA-2024:4776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4776"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5644",
                    "reference_id": "RHSA-2024:5644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5644"
                },
                {
                    "reference_url": "https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21",
                    "reference_id": "user-tmp#n21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T17:02:39Z/"
                        }
                    ],
                    "url": "https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6844-1/",
                    "reference_id": "USN-6844-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6844-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2024-35235"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31913?format=api",
            "vulnerability_id": "VCID-p8gy-dd3u-uqh4",
            "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26691.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09443",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10972",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10974",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10942",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10918",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10782",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10796",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10876",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10835",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10773",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10717",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10851",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10924",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10841",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10917",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26691"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apple-oss-distributions/cups/commits/cups-499.4/cups/scheduler/cert.c"
                },
                {
                    "reference_url": "https://support.apple.com/en-us/HT213183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/en-us/HT213183"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769",
                    "reference_id": "1011769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011769"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084321",
                    "reference_id": "2084321",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084321"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-17",
                    "reference_id": "GLSA-202402-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-17"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4990",
                    "reference_id": "RHSA-2022:4990",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4990"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5054",
                    "reference_id": "RHSA-2022:5054",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5054"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5055",
                    "reference_id": "RHSA-2022:5055",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5055"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5056",
                    "reference_id": "RHSA-2022:5056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5056"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5057",
                    "reference_id": "RHSA-2022:5057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5057"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5454-1/",
                    "reference_id": "USN-5454-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5454-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5454-2/",
                    "reference_id": "USN-5454-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5454-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2022-26691",
                " MNDT-2022-0026"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83662?format=api",
            "vulnerability_id": "VCID-pwkd-sgtt-1bef",
            "summary": "cups: DNS rebinding attacks via incorrect whitelist",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18190.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71966",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71981",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71993",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72017",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72001",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71985",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72026",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72034",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72018",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72063",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7207",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72056",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72088",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72115",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18190"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546395",
                    "reference_id": "1546395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864",
                    "reference_id": "RHSA-2020:3864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3577-1/",
                    "reference_id": "USN-3577-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3577-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2017-18190"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31915?format=api",
            "vulnerability_id": "VCID-q8a8-fd7r-1kg7",
            "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32324.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46866",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46907",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46883",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4683",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46885",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4688",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49244",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49119",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49279",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49276",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49246",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49235",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49202",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49182",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4921",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32324"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209603",
                    "reference_id": "2209603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209603"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7",
                    "reference_id": "GHSA-cxc6-w2g7-69p7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-17",
                    "reference_id": "GLSA-202402-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html",
                    "reference_id": "msg00001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-08T21:43:15Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6596",
                    "reference_id": "RHSA-2023:6596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6596"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7165",
                    "reference_id": "RHSA-2023:7165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1101",
                    "reference_id": "RHSA-2024:1101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1409",
                    "reference_id": "RHSA-2024:1409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1409"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6128-1/",
                    "reference_id": "USN-6128-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6128-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6128-2/",
                    "reference_id": "USN-6128-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6128-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2023-32324"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94170?format=api",
            "vulnerability_id": "VCID-qxwq-vp9g-ukca",
            "summary": "In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04025",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0399",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0383",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03868",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03878",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03892",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03897",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03922",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0389",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03871",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03845",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03824",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03833",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03953",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03967",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03971",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04015",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03973",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-2180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2180"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2019-09-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://source.android.com/security/bulletin/2019-09-01"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957",
                    "reference_id": "934957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2180",
                    "reference_id": "CVE-2019-2180",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2180"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2019-2180"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=api",
            "vulnerability_id": "VCID-ucmb-we3r-aqcd",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98202",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98206",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9821",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98219",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98225",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98227",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98224",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98226",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98228",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98234",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98238",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642",
                    "reference_id": "1221642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-07",
                    "reference_id": "GLSA-201510-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123",
                    "reference_id": "RHSA-2015:1123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1123"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2629-1/",
                    "reference_id": "USN-2629-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2629-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"
                }
            ],
            "aliases": [
                "CVE-2015-1159"
            ],
            "risk_score": 0.2,
            "exploitability": "0.5",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=api",
            "vulnerability_id": "VCID-ukec-69r2-xbef",
            "summary": "A buffer overflow in CUPS might allow remote attackers to execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91768",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91673",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91687",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91696",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91709",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91715",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91719",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91721",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91717",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91738",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9173",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91732",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91737",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91734",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91745",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91758",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588",
                    "reference_id": "1191588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387",
                    "reference_id": "778387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-06",
                    "reference_id": "GLSA-201607-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123",
                    "reference_id": "RHSA-2015:1123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1123"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2520-1/",
                    "reference_id": "USN-2520-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2520-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-9679"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31914?format=api",
            "vulnerability_id": "VCID-vx54-r2dt-8ue5",
            "summary": "Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4504.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10426",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1051",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10494",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10354",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10522",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10489",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10466",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10334",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10307",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10437",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1042",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10352",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10297",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10442",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238509",
                    "reference_id": "2238509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238509"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/",
                    "reference_id": "5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/",
                    "reference_id": "5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/",
                    "reference_id": "AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/"
                },
                {
                    "reference_url": "https://takeonme.org/cves/CVE-2023-4504.html",
                    "reference_id": "CVE-2023-4504.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://takeonme.org/cves/CVE-2023-4504.html"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6",
                    "reference_id": "GHSA-4f65-6ph5-qwh6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h",
                    "reference_id": "GHSA-pf5r-86w9-678h",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-17",
                    "reference_id": "GLSA-202402-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html",
                    "reference_id": "msg00041.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/",
                    "reference_id": "PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/",
                    "reference_id": "T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6391-1/",
                    "reference_id": "USN-6391-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6391-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6391-2/",
                    "reference_id": "USN-6391-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6391-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6392-1/",
                    "reference_id": "USN-6392-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6392-1/"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7",
                    "reference_id": "v2.4.7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:29:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups/releases/tag/v2.4.7"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2023-4504"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34382?format=api",
            "vulnerability_id": "VCID-w17y-dvuq-7ba6",
            "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4181.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2753",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27951",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27959",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27942",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27893",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27807",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27695",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27621",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27448",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27508",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39512",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39331",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39486",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39501",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39493",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39517",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39431",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html"
                },
                {
                    "reference_url": "https://support.apple.com/HT208849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208849"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4243"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607291",
                    "reference_id": "1607291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607291"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4181",
                    "reference_id": "CVE-2018-4181",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4181"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-08",
                    "reference_id": "GLSA-201908-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1050",
                    "reference_id": "RHSA-2020:1050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1050"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3713-1/",
                    "reference_id": "USN-3713-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3713-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2018-4181"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86418?format=api",
            "vulnerability_id": "VCID-wjht-u5u1-kkas",
            "summary": "cups: lppasswd vulnerability allows data access to unprivileged user",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6891.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1417",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14244",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14305",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14116",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14197",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14251",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14155",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14098",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14068",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14106",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1408",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14011",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13889",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14046",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14135",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6891"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6891"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051645",
                    "reference_id": "1051645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1051645"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2082-1/",
                    "reference_id": "USN-2082-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2082-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2013-6891"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wjht-u5u1-kkas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82264?format=api",
            "vulnerability_id": "VCID-wqu4-wys6-hfbb",
            "summary": "cups: stack-buffer-overflow in libcups's asn1_get_type function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8675.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80553",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80545",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80587",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80607",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8061",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80613",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80638",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80641",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80657",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80675",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80697",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80716",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8675"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738455",
                    "reference_id": "1738455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738455"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957",
                    "reference_id": "934957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1765",
                    "reference_id": "RHSA-2020:1765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864",
                    "reference_id": "RHSA-2020:3864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4105-1/",
                    "reference_id": "USN-4105-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4105-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2019-8675"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=api",
            "vulnerability_id": "VCID-yyrd-qt22-w3f5",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81949",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81752",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81775",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81772",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81805",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81825",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81812",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81807",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81844",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81871",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81881",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81886",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81904",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81924",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031"
                },
                {
                    "reference_url": "https://cups.org/str.php?L4455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cups.org/str.php?L4455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60509"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2990"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2341-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2341-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767",
                    "reference_id": "1128767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031",
                    "reference_id": "CVE-2014-5031",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2341-1/",
                    "reference_id": "USN-2341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-5031"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34380?format=api",
            "vulnerability_id": "VCID-zjj3-g2d7-c3gd",
            "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15400.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6126",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6134",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61369",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61338",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61385",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61401",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61422",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61407",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61427",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61431",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61413",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61415",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61409",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61361",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61411",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00411",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6147",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607288",
                    "reference_id": "1607288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607288"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-08",
                    "reference_id": "GLSA-201908-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2017-15400"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34386?format=api",
            "vulnerability_id": "VCID-zt43-htwu-kfde",
            "summary": "Multiple vulnerabilities have been found in CUPS, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6553.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34985",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35212",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35093",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35137",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35163",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35108",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35145",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35131",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35082",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3485",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34833",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34743",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34615",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34688",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34725",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6553"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6553"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607285",
                    "reference_id": "1607285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607285"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605",
                    "reference_id": "903605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903605"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-08",
                    "reference_id": "GLSA-201908-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3713-1/",
                    "reference_id": "USN-3713-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3713-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037285?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038025?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6"
                }
            ],
            "aliases": [
                "CVE-2018-6553"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82265?format=api",
            "vulnerability_id": "VCID-zxp7-6d69-tfhm",
            "summary": "cups: stack-buffer-overflow in libcups's asn1_get_packed function",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80553",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80545",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80587",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80607",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8061",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80613",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80638",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80641",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80657",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80675",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80697",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80716",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738497",
                    "reference_id": "1738497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1738497"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957",
                    "reference_id": "934957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934957"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1765",
                    "reference_id": "RHSA-2020:1765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3864",
                    "reference_id": "RHSA-2020:3864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3864"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4105-1/",
                    "reference_id": "USN-4105-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4105-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584493?format=api",
                    "purl": "pkg:deb/debian/cups@2.3.3op2-3%2Bdeb11u8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-63fa-a4pr-wqh3"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-b1yf-xuc1-ykak"
                        },
                        {
                            "vulnerability": "VCID-dx89-e1nn-w7gz"
                        },
                        {
                            "vulnerability": "VCID-gwcb-nhpk-2kca"
                        },
                        {
                            "vulnerability": "VCID-hc4t-becn-rkcc"
                        },
                        {
                            "vulnerability": "VCID-jy1y-e1nk-p3b4"
                        },
                        {
                            "vulnerability": "VCID-r1q4-2dq2-33ca"
                        },
                        {
                            "vulnerability": "VCID-ry9y-z4e4-yfdh"
                        },
                        {
                            "vulnerability": "VCID-vgtp-sjtt-73e9"
                        },
                        {
                            "vulnerability": "VCID-wr17-e776-bqh1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.3.3op2-3%252Bdeb11u8"
                }
            ],
            "aliases": [
                "CVE-2019-8696"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57702?format=api",
            "vulnerability_id": "VCID-35gf-189e-3ud4",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5029.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15256",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15306",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15412",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15317",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15126",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15133",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15191",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1523",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15228",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15172",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15037",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15162",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cups.org/str.php?L4455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cups.org/str.php?L4455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60509"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2990"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2341-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2341-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600",
                    "reference_id": "1122600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122600"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029",
                    "reference_id": "CVE-2014-5029",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5029"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2341-1/",
                    "reference_id": "USN-2341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-5029"
            ],
            "risk_score": 0.7,
            "exploitability": "0.5",
            "weighted_severity": "1.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35gf-189e-3ud4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48145?format=api",
            "vulnerability_id": "VCID-39f1-22a5-c7aw",
            "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97131",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97138",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97144",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97145",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97159",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97169",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9717",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97174",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97176",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97178",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97183",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97187",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97192",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385",
                    "reference_id": "1235385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-08",
                    "reference_id": "GLSA-201510-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360",
                    "reference_id": "RHSA-2015:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2360"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2659-1/",
                    "reference_id": "USN-2659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2015-3258"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59620?format=api",
            "vulnerability_id": "VCID-3ame-feez-yqhc",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1158.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99181",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99188",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99189",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9919",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99192",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99193",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99195",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99198",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.992",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.81706",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99202",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1158"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641",
                    "reference_id": "1221641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221641"
                },
                {
                    "reference_url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py",
                    "reference_id": "CVE-2015-1158",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://github.com/0x00string/oldays/blob/ab7fdbce3f614fa4f8b62ea9b79bce2da0a0f278/CVE-2015-1158.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py",
                    "reference_id": "CVE-2015-1158",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/41233.py"
                },
                {
                    "reference_url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html",
                    "reference_id": "CVE-2015-1158;OSVDB-123116",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://googleprojectzero.blogspot.se/2015/06/owning-internet-printing-case-study-in.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt",
                    "reference_id": "CVE-2015-1158;OSVDB-123116",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37336.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-07",
                    "reference_id": "GLSA-201510-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123",
                    "reference_id": "RHSA-2015:1123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1123"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2629-1/",
                    "reference_id": "USN-2629-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2629-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"
                }
            ],
            "aliases": [
                "CVE-2015-1158"
            ],
            "risk_score": 1.4,
            "exploitability": "2.0",
            "weighted_severity": "0.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ame-feez-yqhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33707?format=api",
            "vulnerability_id": "VCID-48ht-j7ga-9ugq",
            "summary": "Multiple vulnerabilities have been found in CUPS, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3170.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92649",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92662",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92677",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92683",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92696",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.927",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92703",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92698",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92707",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92721",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.09148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92732",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3170"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=732106",
                    "reference_id": "732106",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=732106"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201207-10",
                    "reference_id": "GLSA-201207-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201207-10"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1207-1/",
                    "reference_id": "USN-1207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1207-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2011-3170"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48ht-j7ga-9ugq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=api",
            "vulnerability_id": "VCID-4bxg-5tnm-y3hw",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5254",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52585",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52578",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52629",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52624",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52674",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52657",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52642",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5268",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52671",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52622",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52632",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52595",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52537",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5259",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52636",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333",
                    "reference_id": "741333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2144-1/",
                    "reference_id": "USN-2144-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2144-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2013-6476"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=api",
            "vulnerability_id": "VCID-843p-8xve-nfer",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95567",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95576",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95581",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95583",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95589",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95592",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95597",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95598",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95609",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95613",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95614",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95616",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95615",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95632",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95635",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95642",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333",
                    "reference_id": "741333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2144-1/",
                    "reference_id": "USN-2144-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2144-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2013-6474"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57701?format=api",
            "vulnerability_id": "VCID-anr5-gc12-e7dr",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16598",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16637",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16867",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16652",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16737",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16771",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16727",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16606",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16614",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16653",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16555",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16544",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16509",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16374",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00053",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16493",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/59945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/59945"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60273"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT6535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/kb/HT6535"
                },
                {
                    "reference_url": "http://www.cups.org/blog.php?L724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cups.org/blog.php?L724"
                },
                {
                    "reference_url": "http://www.cups.org/str.php?L4450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cups.org/str.php?L4450"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/68788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/68788"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1030611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1030611"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2293-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2293-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576",
                    "reference_id": "1115576",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115576"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537",
                    "reference_id": "CVE-2014-3537",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2293-1/",
                    "reference_id": "USN-2293-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2293-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-3537"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-anr5-gc12-e7dr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48146?format=api",
            "vulnerability_id": "VCID-ed99-uccv-d7bh",
            "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96975",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96979",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96981",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9699",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96993",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96994",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96995",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97004",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97007",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9701",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97011",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97012",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97015",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97018",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97022",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97029",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990",
                    "reference_id": "1238990",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-08",
                    "reference_id": "GLSA-201510-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360",
                    "reference_id": "RHSA-2015:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2360"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2659-1/",
                    "reference_id": "USN-2659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2015-3279"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57703?format=api",
            "vulnerability_id": "VCID-fby6-8f6z-63fw",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16117",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16109",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16292",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16354",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16239",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16304",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16286",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16247",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16134",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16061",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16059",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16021",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15902",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16015",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cups.org/str.php?L4455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cups.org/str.php?L4455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60509"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2990"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2341-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2341-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764",
                    "reference_id": "1128764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128764"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030",
                    "reference_id": "CVE-2014-5030",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5030"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2341-1/",
                    "reference_id": "USN-2341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-5030"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fby6-8f6z-63fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=api",
            "vulnerability_id": "VCID-mcmb-bvw9-dba5",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95557",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95566",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95573",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9558",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95583",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95589",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9559",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95599",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95604",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95605",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95607",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95622",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95625",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95632",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550",
                    "reference_id": "1027550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333",
                    "reference_id": "741333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2144-1/",
                    "reference_id": "USN-2144-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2144-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2013-6475"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41478?format=api",
            "vulnerability_id": "VCID-mtzd-538p-kbhm",
            "summary": "A vulnerability in CUPS may allow for arbitrary file access.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0580.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0580.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5519.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93203",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93114",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93123",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93127",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93126",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93144",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93141",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93143",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93159",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93164",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93171",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93176",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93172",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93179",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.10228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93193",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80012"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT5784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT5784"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/10/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/11/10/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/11/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/11/11/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/11/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/11/11/5"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/56494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/56494"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1654-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1654-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791",
                    "reference_id": "692791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898",
                    "reference_id": "875898",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875898"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5519",
                    "reference_id": "CVE-2012-5519",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5519"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201404-01",
                    "reference_id": "GLSA-201404-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201404-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0580",
                    "reference_id": "RHSA-2013:0580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0580"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1654-1/",
                    "reference_id": "USN-1654-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1654-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2012-5519"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtzd-538p-kbhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59622?format=api",
            "vulnerability_id": "VCID-ucmb-we3r-aqcd",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1159.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98202",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98206",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9821",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98211",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98216",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98219",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98225",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98227",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98224",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98226",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98228",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98234",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.58776",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98238",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1159"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642",
                    "reference_id": "1221642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221642"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-07",
                    "reference_id": "GLSA-201510-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123",
                    "reference_id": "RHSA-2015:1123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1123"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2629-1/",
                    "reference_id": "USN-2629-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2629-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036256?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037284?format=api",
                    "purl": "pkg:deb/debian/cups@2.2.1-8%2Bdeb9u1~bpo8%2B1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.1-8%252Bdeb9u1~bpo8%252B1"
                }
            ],
            "aliases": [
                "CVE-2015-1159"
            ],
            "risk_score": 0.2,
            "exploitability": "0.5",
            "weighted_severity": "0.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucmb-we3r-aqcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36514?format=api",
            "vulnerability_id": "VCID-ukec-69r2-xbef",
            "summary": "A buffer overflow in CUPS might allow remote attackers to execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9679.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91768",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91673",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91687",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91696",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91709",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91715",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91719",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91721",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91717",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91738",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9173",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91732",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91737",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91734",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91745",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91758",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9679"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588",
                    "reference_id": "1191588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191588"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387",
                    "reference_id": "778387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=778387"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-06",
                    "reference_id": "GLSA-201607-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1123",
                    "reference_id": "RHSA-2015:1123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1123"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2520-1/",
                    "reference_id": "USN-2520-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2520-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-9679"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukec-69r2-xbef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56772?format=api",
            "vulnerability_id": "VCID-y7a9-2p1n-z7fx",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91578",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91584",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91606",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91612",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91616",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91618",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91615",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91637",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9163",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91629",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91636",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91635",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91632",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91645",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91658",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91668",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753",
                    "reference_id": "643753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800",
                    "reference_id": "727800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1635",
                    "reference_id": "RHSA-2011:1635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0302",
                    "reference_id": "RHSA-2012:0302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1180",
                    "reference_id": "RHSA-2012:1180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1181",
                    "reference_id": "RHSA-2012:1181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1181"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1207-1/",
                    "reference_id": "USN-1207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1207-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1214-1/",
                    "reference_id": "USN-1214-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1214-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                }
            ],
            "aliases": [
                "CVE-2011-2896"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57704?format=api",
            "vulnerability_id": "VCID-yyrd-qt22-w3f5",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://advisories.mageia.org/MGASA-2014-0313.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://advisories.mageia.org/MGASA-2014-0313.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1388.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81949",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81742",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81752",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81775",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81772",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81805",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81825",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81812",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81807",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81844",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81871",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81881",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81886",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81904",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01618",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81924",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5031"
                },
                {
                    "reference_url": "https://cups.org/str.php?L4455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cups.org/str.php?L4455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60509"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60787"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2990",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2990"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:108"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/13"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/07/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/07/22/2"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2341-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2341-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767",
                    "reference_id": "1128767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128767"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031",
                    "reference_id": "CVE-2014-5031",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5031"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1388",
                    "reference_id": "RHSA-2014:1388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1388"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2341-1/",
                    "reference_id": "USN-2341-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2341-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571555?format=api",
                    "purl": "pkg:deb/debian/cups@1.5.3-5%2Bdeb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-35gf-189e-3ud4"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-anr5-gc12-e7dr"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-cf81-58ju-bqaz"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fby6-8f6z-63fw"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-ukec-69r2-xbef"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wjht-u5u1-kkas"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-yyrd-qt22-w3f5"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036255?format=api",
                    "purl": "pkg:deb/debian/cups@1.7.5-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2chf-23mc-d3dn"
                        },
                        {
                            "vulnerability": "VCID-3ame-feez-yqhc"
                        },
                        {
                            "vulnerability": "VCID-3etj-2m21-ffa1"
                        },
                        {
                            "vulnerability": "VCID-44ju-8618-vqht"
                        },
                        {
                            "vulnerability": "VCID-6mus-21kz-uuhz"
                        },
                        {
                            "vulnerability": "VCID-7wg4-sc9v-bffk"
                        },
                        {
                            "vulnerability": "VCID-993k-m3sq-gufu"
                        },
                        {
                            "vulnerability": "VCID-am36-6m5v-fkba"
                        },
                        {
                            "vulnerability": "VCID-apyh-1uza-pffa"
                        },
                        {
                            "vulnerability": "VCID-aznw-8yer-xfhf"
                        },
                        {
                            "vulnerability": "VCID-bzht-vhe3-y7bf"
                        },
                        {
                            "vulnerability": "VCID-ev9c-v5dv-37fb"
                        },
                        {
                            "vulnerability": "VCID-fkyp-m1p9-mfhy"
                        },
                        {
                            "vulnerability": "VCID-k4yw-jg6v-1bcc"
                        },
                        {
                            "vulnerability": "VCID-p8gy-dd3u-uqh4"
                        },
                        {
                            "vulnerability": "VCID-pwkd-sgtt-1bef"
                        },
                        {
                            "vulnerability": "VCID-q8a8-fd7r-1kg7"
                        },
                        {
                            "vulnerability": "VCID-qxwq-vp9g-ukca"
                        },
                        {
                            "vulnerability": "VCID-ucmb-we3r-aqcd"
                        },
                        {
                            "vulnerability": "VCID-vx54-r2dt-8ue5"
                        },
                        {
                            "vulnerability": "VCID-w17y-dvuq-7ba6"
                        },
                        {
                            "vulnerability": "VCID-wqu4-wys6-hfbb"
                        },
                        {
                            "vulnerability": "VCID-zjj3-g2d7-c3gd"
                        },
                        {
                            "vulnerability": "VCID-zt43-htwu-kfde"
                        },
                        {
                            "vulnerability": "VCID-zxp7-6d69-tfhm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.7.5-11"
                }
            ],
            "aliases": [
                "CVE-2014-5031"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyrd-qt22-w3f5"
        }
    ],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@1.5.3-5%252Bdeb7u6"
}