Lookup for vulnerable packages by Package URL.

GET /api/packages/572108?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/572108?format=api",
    "purl": "pkg:deb/debian/libwmf@0.2.8.4-6%2Blenny1",
    "type": "deb",
    "namespace": "debian",
    "name": "libwmf",
    "version": "0.2.8.4-6+lenny1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "0.2.8.4-10.6",
    "latest_non_vulnerable_version": "0.2.8.4-10.6",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36658?format=api",
            "vulnerability_id": "VCID-5qdc-jjh5-gfba",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90462",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90388",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90391",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90403",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90407",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90421",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90428",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90443",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90441",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90455",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9045",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1272993",
                    "reference_id": "1272993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1272993"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644",
                    "reference_id": "787644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/572112?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036244?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052312?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6"
                }
            ],
            "aliases": [
                "CVE-2015-4588"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5qdc-jjh5-gfba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36661?format=api",
            "vulnerability_id": "VCID-5we4-7e6c-7bb6",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83586",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83426",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83453",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83452",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83476",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83486",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.835",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83494",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83526",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83527",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83528",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83551",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83558",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01958",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83562",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235669",
                    "reference_id": "1235669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235669"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192",
                    "reference_id": "784192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/572112?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036244?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052312?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6"
                }
            ],
            "aliases": [
                "CVE-2015-4696"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-7e6c-7bb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36657?format=api",
            "vulnerability_id": "VCID-9fnx-1dty-4yg9",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89292",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89298",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89312",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89313",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8933",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89335",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89343",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8934",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89351",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8935",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89347",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89365",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89369",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89371",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227243",
                    "reference_id": "1227243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227243"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644",
                    "reference_id": "787644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/572112?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036244?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052312?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6"
                }
            ],
            "aliases": [
                "CVE-2015-0848"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fnx-1dty-4yg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84836?format=api",
            "vulnerability_id": "VCID-evjq-akma-sfhf",
            "summary": "libwmf: Memory allocation failure in wmf_malloc",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6553",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65647",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65664",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65661",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65672",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65671",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65578",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65608",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6566",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65645",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65616",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00491",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65651",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9011"
                },
                {
                    "reference_url": "https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/10/25/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/10/25/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/93860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/93860"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388450",
                    "reference_id": "1388450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388450"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090",
                    "reference_id": "842090",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9011",
                    "reference_id": "CVE-2016-9011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9011"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052312?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6"
                }
            ],
            "aliases": [
                "CVE-2016-9011"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evjq-akma-sfhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41410?format=api",
            "vulnerability_id": "VCID-kym4-etgv-u3bv",
            "summary": "libwmf bundles an old GD version which contains a \"use-after-free\"\n    vulnerability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86955",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8684",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8686",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86882",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86895",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86885",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86902",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86908",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86925",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8693",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86934",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1364"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496864",
                    "reference_id": "496864",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496864"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434",
                    "reference_id": "526434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200907-01",
                    "reference_id": "GLSA-200907-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200907-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0457",
                    "reference_id": "RHSA-2009:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0457"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/769-1/",
                    "reference_id": "USN-769-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/769-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/572109?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-6.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-6.1"
                }
            ],
            "aliases": [
                "CVE-2009-1364"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kym4-etgv-u3bv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36659?format=api",
            "vulnerability_id": "VCID-zc4g-jn49-63gd",
            "summary": "Multiple vulnerabilities have been found in libwmf allowing remote\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81499",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81346",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81377",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81375",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81403",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81417",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81409",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81446",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81447",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81448",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8147",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81477",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01549",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81482",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235665",
                    "reference_id": "1235665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235665"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205",
                    "reference_id": "784205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-1",
                    "reference_id": "ASA-201701-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-16",
                    "reference_id": "AVG-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-03",
                    "reference_id": "GLSA-201602-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1917",
                    "reference_id": "RHSA-2015:1917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2670-1/",
                    "reference_id": "USN-2670-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2670-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/572112?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036244?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5qdc-jjh5-gfba"
                        },
                        {
                            "vulnerability": "VCID-5we4-7e6c-7bb6"
                        },
                        {
                            "vulnerability": "VCID-9fnx-1dty-4yg9"
                        },
                        {
                            "vulnerability": "VCID-evjq-akma-sfhf"
                        },
                        {
                            "vulnerability": "VCID-zc4g-jn49-63gd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1052312?format=api",
                    "purl": "pkg:deb/debian/libwmf@0.2.8.4-10.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6"
                }
            ],
            "aliases": [
                "CVE-2015-4695"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zc4g-jn49-63gd"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-6%252Blenny1"
}