Lookup for vulnerable packages by Package URL.

GET /api/packages/582544?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "cups-filters",
    "version": "1.28.17-6+deb13u1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.28.17-7",
    "latest_non_vulnerable_version": "1.28.17-7",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61902?format=api",
            "vulnerability_id": "VCID-3317-h26p-43ef",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS"
                },
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0491.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0491.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95254",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95641",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95645",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95569",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95577",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95584",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95587",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95592",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9556",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95602",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95608",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95607",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9561",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95625",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95628",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.2071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95635",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8327"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-printing/2015/11/msg00020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-printing/2015/11/msg00020.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-printing/2015/12/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-printing/2015/12/msg00001.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3411",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3411"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3429"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/78524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/78524"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2831-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2831-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2831-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2831-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287523",
                    "reference_id": "1287523",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1287523"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8327",
                    "reference_id": "CVE-2015-8327",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0491",
                    "reference_id": "RHSA-2016:0491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0491"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2831-1/",
                    "reference_id": "USN-2831-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2831-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2831-2/",
                    "reference_id": "USN-2831-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2831-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582622?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.2.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.2.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-8327"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3317-h26p-43ef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48145?format=api",
            "vulnerability_id": "VCID-39f1-22a5-c7aw",
            "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.33515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96983",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97138",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97144",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97145",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97159",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97169",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97131",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97174",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97175",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97176",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97178",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97183",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97187",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97192",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97197",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97202",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.37078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9717",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385",
                    "reference_id": "1235385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1235385"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-08",
                    "reference_id": "GLSA-201510-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360",
                    "reference_id": "RHSA-2015:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2360"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2659-1/",
                    "reference_id": "USN-2659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585042?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.70-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.70-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3258"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32182?format=api",
            "vulnerability_id": "VCID-4bxg-5tnm-y3hw",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5254",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52585",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52578",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52629",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52624",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52674",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52657",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52642",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5268",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52687",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52671",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52622",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52632",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52595",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52537",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5259",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52636",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52599",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00303",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53704",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6476"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333",
                    "reference_id": "741333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2144-1/",
                    "reference_id": "USN-2144-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2144-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584175?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6476"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86302?format=api",
            "vulnerability_id": "VCID-581d-k9k6-rke4",
            "summary": "cups-filters: unsupported BrowseAllow value lets cups-browsed accept from all hosts",
            "references": [
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2014/04/25/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2014/04/25/7"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2014/06/19/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2014/06/19/12"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1795.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1795.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4338.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4338.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6045",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60207",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60309",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60277",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60342",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60363",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6035",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60331",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60372",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6038",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60369",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6034",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60355",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60343",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60301",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60347",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60406",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6039",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4338"
                },
                {
                    "reference_url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=1204"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338"
                },
                {
                    "reference_url": "http://secunia.com/advisories/62044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/62044"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/68124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/68124"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091568",
                    "reference_id": "1091568",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091568"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4338",
                    "reference_id": "CVE-2014-4338",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1795",
                    "reference_id": "RHSA-2014:1795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1795"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582541?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.53-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-4338"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-581d-k9k6-rke4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66476?format=api",
            "vulnerability_id": "VCID-6qd1-jvb8-jqak",
            "summary": "cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-64503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06652",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06564",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06637",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06645",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06556",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09803",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09658",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09582",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09495",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09656",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09726",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09704",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00033",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09737",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14874",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14849",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14926",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14728",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14819",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-64503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697",
                    "reference_id": "1120697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698",
                    "reference_id": "1120698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414705",
                    "reference_id": "2414705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414705"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865",
                    "reference_id": "50d94ca0f2fa6177613c97c59791bde568631865",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9",
                    "reference_id": "GHSA-893j-2wr2-wrh9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620",
                    "reference_id": "pdftoraster.cxx#L1620",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790",
                    "reference_id": "pdftoraster.cxx#L1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880",
                    "reference_id": "pdftoraster.cxx#L1880",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814",
                    "reference_id": "RHSA-2026:8814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8814"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7877-1/",
                    "reference_id": "USN-7877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7878-1/",
                    "reference_id": "USN-7878-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7878-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584716?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-64503"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qd1-jvb8-jqak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66479?format=api",
            "vulnerability_id": "VCID-7xq5-z572-xub3",
            "summary": "cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04222",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04094",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04123",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04148",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04102",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06655",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0636",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06387",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.064",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06417",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0654",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06607",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06619",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06631",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15589",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15579",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15646",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15447",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15534",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-57812"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703",
                    "reference_id": "1120703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704",
                    "reference_id": "1120704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414632",
                    "reference_id": "2414632",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414632"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa",
                    "reference_id": "b69dfacec7f176281782e2f7ac44f04bf9633cfa",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4",
                    "reference_id": "GHSA-jpxg-qc2c-hgv4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32",
                    "reference_id": "image-tiff.c#L32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34",
                    "reference_id": "image-tiff.c#L34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613",
                    "reference_id": "imagetoraster.c#L613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8814",
                    "reference_id": "RHSA-2026:8814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8814"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7877-1/",
                    "reference_id": "USN-7877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7878-1/",
                    "reference_id": "USN-7878-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7878-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584716?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-57812"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xq5-z572-xub3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32179?format=api",
            "vulnerability_id": "VCID-843p-8xve-nfer",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.14176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94451",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95576",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95581",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95583",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95589",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95592",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95597",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95598",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95609",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95567",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95614",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95616",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95615",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95632",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95635",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95642",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95648",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95652",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.20771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95613",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333",
                    "reference_id": "741333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2144-1/",
                    "reference_id": "USN-2144-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2144-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584175?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6474"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86305?format=api",
            "vulnerability_id": "VCID-8vd7-dfbu-23d4",
            "summary": "cups-filters: incomplete fix for CVE-2014-2707",
            "references": [
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2014/04/25/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2014/04/25/7"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2014/06/19/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2014/06/19/12"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4336.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4336.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67096",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66845",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66883",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66909",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66931",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66944",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66964",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6695",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66919",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66952",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66967",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66949",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66971",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66984",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66982",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66954",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66996",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67036",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67008",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67032",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4336"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091565",
                    "reference_id": "1091565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091565"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4336",
                    "reference_id": "CVE-2014-4336",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4336"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582541?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.53-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-4336"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8vd7-dfbu-23d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85785?format=api",
            "vulnerability_id": "VCID-bgm5-bmfa-yugq",
            "summary": "cups-filters: remote command execution in remove_bad_chars() (incomplete fix for CVE-2014-2707)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2265.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2265.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2265",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90437",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90449",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90454",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90467",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90472",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9048",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90473",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9049",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90488",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90501",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90498",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90508",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90526",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90537",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90535",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90543",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.05767",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90558",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2265"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199130",
                    "reference_id": "1199130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199130"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780267",
                    "reference_id": "780267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780267"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2532-1/",
                    "reference_id": "USN-2532-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2532-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585587?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.61-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-2265"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgm5-bmfa-yugq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32183?format=api",
            "vulnerability_id": "VCID-cne2-7ev5-abgv",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7995",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79979",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79968",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80025",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80009",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80001",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80029",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80058",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80063",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80079",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80092",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80114",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80129",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80127",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80142",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80184",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2707"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083326",
                    "reference_id": "1083326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1083326"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470",
                    "reference_id": "743470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2210-1/",
                    "reference_id": "USN-2210-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2210-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585601?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.51-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.51-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-2707"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cne2-7ev5-abgv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86307?format=api",
            "vulnerability_id": "VCID-dvvu-6p49-vbhz",
            "summary": "cups-filters: cups-browsed DoS via process_browse_data() OOB read",
            "references": [
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2014/06/19/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2014/06/19/12"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1795.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1795.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4337.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4337.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4337",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84354",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84111",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84124",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84142",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84144",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84172",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84189",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84183",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8418",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84201",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84202",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84205",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8423",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84244",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84263",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84289",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84305",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84304",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.02131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84321",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4337"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337"
                },
                {
                    "reference_url": "http://secunia.com/advisories/62044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/62044"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/68122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/68122"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111510",
                    "reference_id": "1111510",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111510"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4337",
                    "reference_id": "CVE-2014-4337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1795",
                    "reference_id": "RHSA-2014:1795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1795"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582541?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.53-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-4337"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvvu-6p49-vbhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48146?format=api",
            "vulnerability_id": "VCID-ed99-uccv-d7bh",
            "summary": "Multiple vulnerabilities have been found in cups-filters, the worst\n    of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.31039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96793",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96975",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96979",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96981",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9699",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96993",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96994",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96995",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97004",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9701",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97011",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97012",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97015",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97018",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97022",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97029",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97032",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97037",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.34505",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97007",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990",
                    "reference_id": "1238990",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1238990"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201510-08",
                    "reference_id": "GLSA-201510-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201510-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2360",
                    "reference_id": "RHSA-2015:2360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2360"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2659-1/",
                    "reference_id": "USN-2659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585615?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.71-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.71-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3279"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73814?format=api",
            "vulnerability_id": "VCID-f6n6-k5ye-3ugq",
            "summary": "cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98849",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98813",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98816",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98817",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98819",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9882",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98821",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98825",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98827",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98834",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98838",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9884",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98843",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98845",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.73875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98846",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.74242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9883",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.74242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98849",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.74242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98853",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47076"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821",
                    "reference_id": "1082821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827",
                    "reference_id": "1082827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253",
                    "reference_id": "2314253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314253"
                },
                {
                    "reference_url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I",
                    "reference_id": "Attacking-UNIX-systems-via-CUPS-Part-I",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"
                        }
                    ],
                    "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6",
                    "reference_id": "GHSA-7xfx-47qg-grp6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47",
                    "reference_id": "GHSA-p9rh-jxmq-gq47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8",
                    "reference_id": "GHSA-rj88-6mr5-rcw8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5",
                    "reference_id": "GHSA-w63j-6g73-wmg5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7346",
                    "reference_id": "RHSA-2024:7346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7461",
                    "reference_id": "RHSA-2024:7461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7461"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7462",
                    "reference_id": "RHSA-2024:7462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7463",
                    "reference_id": "RHSA-2024:7463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7503",
                    "reference_id": "RHSA-2024:7503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7504",
                    "reference_id": "RHSA-2024:7504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7506",
                    "reference_id": "RHSA-2024:7506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7551",
                    "reference_id": "RHSA-2024:7551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7553",
                    "reference_id": "RHSA-2024:7553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7623",
                    "reference_id": "RHSA-2024:7623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7623"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7043-1/",
                    "reference_id": "USN-7043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7043-4/",
                    "reference_id": "USN-7043-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7043-4/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7044-1/",
                    "reference_id": "USN-7044-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7044-1/"
                },
                {
                    "reference_url": "https://www.cups.org",
                    "reference_id": "www.cups.org",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/"
                        }
                    ],
                    "url": "https://www.cups.org"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584172?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584173?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584174?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47076"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6n6-k5ye-3ugq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85683?format=api",
            "vulnerability_id": "VCID-g55y-sm3g-pbd6",
            "summary": "foomatic: potential remote arbitrary code execution",
            "references": [
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0491.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0491.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5325.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5325.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-5325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91057",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91039",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91047",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90913",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90928",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90939",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9095",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90956",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90966",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9099",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90989",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91002",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90997",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91011",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9104",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-5325"
                },
                {
                    "reference_url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.linuxfoundation.org/show_bug.cgi?id=515"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5325"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/15/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/15/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/15/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/15/7"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218297",
                    "reference_id": "1218297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218297"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5325",
                    "reference_id": "CVE-2010-5325",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0491",
                    "reference_id": "RHSA-2016:0491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0491"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586427?format=api",
                    "purl": "pkg:deb/debian/cups-filters@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-5325"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g55y-sm3g-pbd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73813?format=api",
            "vulnerability_id": "VCID-jvcy-2qyh-jqg4",
            "summary": "cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.87039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99434",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.87039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99445",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.87039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99443",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99474",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99458",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9946",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99461",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99462",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99467",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99471",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99472",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.87593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99473",
                            "published_at": "2026-05-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820",
                    "reference_id": "1082820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252",
                    "reference_id": "2314252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314252"
                },
                {
                    "reference_url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I",
                    "reference_id": "Attacking-UNIX-systems-via-CUPS-Part-I",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992",
                    "reference_id": "cups-browsed.c#L13992",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6",
                    "reference_id": "GHSA-7xfx-47qg-grp6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47",
                    "reference_id": "GHSA-p9rh-jxmq-gq47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8",
                    "reference_id": "GHSA-rj88-6mr5-rcw8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5",
                    "reference_id": "GHSA-w63j-6g73-wmg5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7346",
                    "reference_id": "RHSA-2024:7346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7461",
                    "reference_id": "RHSA-2024:7461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7461"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7462",
                    "reference_id": "RHSA-2024:7462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7463",
                    "reference_id": "RHSA-2024:7463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7503",
                    "reference_id": "RHSA-2024:7503",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7503"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7504",
                    "reference_id": "RHSA-2024:7504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7506",
                    "reference_id": "RHSA-2024:7506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7506"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7551",
                    "reference_id": "RHSA-2024:7551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7553",
                    "reference_id": "RHSA-2024:7553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7553"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7623",
                    "reference_id": "RHSA-2024:7623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7623"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7042-1/",
                    "reference_id": "USN-7042-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7042-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7042-2/",
                    "reference_id": "USN-7042-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7042-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7042-3/",
                    "reference_id": "USN-7042-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7042-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7043-1/",
                    "reference_id": "USN-7043-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7043-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7043-2/",
                    "reference_id": "USN-7043-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7043-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7043-3/",
                    "reference_id": "USN-7043-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7043-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7043-4/",
                    "reference_id": "USN-7043-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7043-4/"
                },
                {
                    "reference_url": "https://www.cups.org",
                    "reference_id": "www.cups.org",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/"
                        }
                    ],
                    "url": "https://www.cups.org"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584172?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584173?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584174?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47176"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvcy-2qyh-jqg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32181?format=api",
            "vulnerability_id": "VCID-mcmb-bvw9-dba5",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.14107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94432",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95566",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95573",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9558",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95583",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95588",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95589",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9559",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95557",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95604",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95605",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95607",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95622",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95625",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95632",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95638",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95642",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.20679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95599",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550",
                    "reference_id": "1027550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333",
                    "reference_id": "741333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2144-1/",
                    "reference_id": "USN-2144-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2144-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584175?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6475"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66439?format=api",
            "vulnerability_id": "VCID-rcep-az2v-1yab",
            "summary": "cups-filters: cups-filters: Heap buffer overflow in rastertopclx filter may lead arbitrary code execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-64524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06315",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06304",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06277",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06259",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06351",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07809",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07533",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07677",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07747",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0774",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07763",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09873",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09821",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09703",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09841",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09742",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09813",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09865",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09837",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00034",
                            "scoring_system": "epss",
                            "scoring_elements": "0.09791",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-64524"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414780",
                    "reference_id": "2414780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414780"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06",
                    "reference_id": "956283c74a34ae924266a2a63f8e5f529a1abd06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06"
                },
                {
                    "reference_url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv",
                    "reference_id": "GHSA-rq44-2q5p-x3hv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/"
                        }
                    ],
                    "url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7878-1/",
                    "reference_id": "USN-7878-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7878-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7878-2/",
                    "reference_id": "USN-7878-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7878-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584716?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-64524"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rcep-az2v-1yab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61903?format=api",
            "vulnerability_id": "VCID-uz2u-k3vm-w3c2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS"
                },
                {
                    "reference_url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0491.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0491.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92818",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93367",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93403",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93409",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93328",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93336",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93344",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93362",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93314",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93374",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93378",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93375",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93373",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93381",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.10778",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93393",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8560"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3419"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3429"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/13/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/13/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/14/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/14/13"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2838-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2838-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2838-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2838-2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291227",
                    "reference_id": "1291227",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291227"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930",
                    "reference_id": "807930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993",
                    "reference_id": "807993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8560",
                    "reference_id": "CVE-2015-8560",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8560"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0491",
                    "reference_id": "RHSA-2016:0491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0491"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2838-1/",
                    "reference_id": "USN-2838-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2838-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2838-2/",
                    "reference_id": "USN-2838-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2838-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586840?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.4.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.4.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-8560"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uz2u-k3vm-w3c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32178?format=api",
            "vulnerability_id": "VCID-vunm-ehd2-yugs",
            "summary": "Multiple vulnerabilities have been found in cups-filters, worst of\n    which allows remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94225",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94234",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94246",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94247",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94266",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9428",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94286",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94289",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94294",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94304",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94315",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9432",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94326",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.13715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94341",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318",
                    "reference_id": "741318",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-16",
                    "reference_id": "GLSA-201406-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2143-1/",
                    "reference_id": "USN-2143-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2143-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584175?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6473"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vunm-ehd2-yugs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36000?format=api",
            "vulnerability_id": "VCID-vzgv-8drt-8yd5",
            "summary": "A vulnerability has been found in CUPS filters where remote code execution is possible via the beh filter.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92575",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9258",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92586",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92587",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92599",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92901",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92897",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92908",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92868",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92864",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92873",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.09527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92887",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93177",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93183",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10696",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93398",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-24805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224",
                    "reference_id": "1036224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203051",
                    "reference_id": "2203051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203051"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-06",
                    "reference_id": "GLSA-202401-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3423",
                    "reference_id": "RHSA-2023:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3424",
                    "reference_id": "RHSA-2023:3424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3425",
                    "reference_id": "RHSA-2023:3425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3425"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3426",
                    "reference_id": "RHSA-2023:3426",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3426"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3427",
                    "reference_id": "RHSA-2023:3427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3427"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3428",
                    "reference_id": "RHSA-2023:3428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3429",
                    "reference_id": "RHSA-2023:3429",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3429"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6083-1/",
                    "reference_id": "USN-6083-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6083-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6083-2/",
                    "reference_id": "USN-6083-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6083-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582542?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585004?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582543?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582544?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582545?format=api",
                    "purl": "pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-24805"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzgv-8drt-8yd5"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie"
}