{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","type":"ebuild","namespace":"app-emulation","name":"emul-linux-x86-baselibs","version":"20140406-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34261?format=json","vulnerability_id":"VCID-2nvs-t3tu-6qb5","summary":"Multiple vulnerabilities have been found in VMware Player, Server,\n    and Workstation, allowing remote and local attackers to conduct several\n    attacks, including privilege escalation, remote execution of arbitrary\n    code, and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5269","reference_id":"","reference_type":"","scores":[{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08043","scoring_system":"epss","scoring_elements":"0.92125","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5269"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=324771","reference_id":"324771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=324771"},{"reference_url":"https://security.gentoo.org/glsa/200711-08","reference_id":"GLSA-200711-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-08"},{"reference_url":"https://security.gentoo.org/glsa/201209-25","reference_id":"GLSA-201209-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201209-25"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0992","reference_id":"RHSA-2007:0992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0992"},{"reference_url":"https://usn.ubuntu.com/538-1/","reference_id":"USN-538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/538-1/"},{"reference_url":"https://usn.ubuntu.com/730-1/","reference_id":"USN-730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/730-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-5269"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nvs-t3tu-6qb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6820?format=json","vulnerability_id":"VCID-2r5u-7wpy-4yf9","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nlibxml2 allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka \"internal entity expansion\" with linear complexity.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=142798889927587&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=142798889927587&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0338.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0338.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0338","reference_id":"","reference_type":"","scores":[{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71375","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71358","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71369","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00672","scoring_system":"epss","scoring_elements":"0.71391","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338"},{"reference_url":"http://secunia.com/advisories/52662","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52662"},{"reference_url":"http://secunia.com/advisories/55568","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55568"},{"reference_url":"https://git.gnome.org/browse/libxml2/commit/?id=23f05e0c33987d6605387b300c4be5da2120a7ab","reference_id":"","reference_type":"","scores":[],"url":"https://git.gnome.org/browse/libxml2/commit/?id=23f05e0c33987d6605387b300c4be5da2120a7ab"},{"reference_url":"http://www.debian.org/security/2013/dsa-2652","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2652"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:056","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:056"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1782-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1782-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702260","reference_id":"702260","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702260"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=912400","reference_id":"912400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=912400"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0338","reference_id":"CVE-2013-0338","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0338"},{"reference_url":"https://security.gentoo.org/glsa/201311-06","reference_id":"GLSA-201311-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-06"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0581","reference_id":"RHSA-2013:0581","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0581"},{"reference_url":"https://usn.ubuntu.com/1782-1/","reference_id":"USN-1782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1782-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2013-0338"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2r5u-7wpy-4yf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56195?format=json","vulnerability_id":"VCID-3vte-bsf9-cyh7","summary":"Multiple vulnerabilities have been found in AMD64 x86 emulation\n    base libraries, the worst of which may allow remote execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5266.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5266.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5266","reference_id":"","reference_type":"","scores":[{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94017","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94038","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94041","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94049","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94058","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12913","scoring_system":"epss","scoring_elements":"0.94057","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5266"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=324711","reference_id":"324711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=324711"},{"reference_url":"https://security.gentoo.org/glsa/200711-08","reference_id":"GLSA-200711-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-08"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-5266"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3vte-bsf9-cyh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46241?format=json","vulnerability_id":"VCID-45dp-3xz9-qyd3","summary":"A vulnerability in libpng may allow a remote attacker to crash applications\n    that handle untrusted images.","references":[{"reference_url":"http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html","reference_id":"","reference_type":"","scores":[],"url":"http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=307562","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=307562"},{"reference_url":"http://irrlicht.sourceforge.net/changes.txt","reference_id":"","reference_type":"","scores":[],"url":"http://irrlicht.sourceforge.net/changes.txt"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"},{"reference_url":"http://openpkg.com/go/OpenPKG-SA-2007.013","reference_id":"","reference_type":"","scores":[],"url":"http://openpkg.com/go/OpenPKG-SA-2007.013"},{"reference_url":"http://osvdb.org/36196","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36196"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2445.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2445","reference_id":"","reference_type":"","scores":[{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97228","published_at":"2026-04-13T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97206","published_at":"2026-04-02T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97212","published_at":"2026-04-04T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97213","published_at":"2026-04-07T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97223","published_at":"2026-04-09T12:55:00Z"},{"value":"0.38264","scoring_system":"epss","scoring_elements":"0.97227","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445"},{"reference_url":"http://secunia.com/advisories/25268","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25268"},{"reference_url":"http://secunia.com/advisories/25273","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25273"},{"reference_url":"http://secunia.com/advisories/25292","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25292"},{"reference_url":"http://secunia.com/advisories/25329","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25329"},{"reference_url":"http://secunia.com/advisories/25353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25353"},{"reference_url":"http://secunia.com/advisories/25461","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25461"},{"reference_url":"http://secunia.com/advisories/25554","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25554"},{"reference_url":"http://secunia.com/advisories/25571","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25571"},{"reference_url":"http://secunia.com/advisories/25742","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25742"},{"reference_url":"http://secunia.com/advisories/25787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25787"},{"reference_url":"http://secunia.com/advisories/25867","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25867"},{"reference_url":"http://secunia.com/advisories/27056","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27056"},{"reference_url":"http://secunia.com/advisories/29420","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29420"},{"reference_url":"http://secunia.com/advisories/30161","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30161"},{"reference_url":"http://secunia.com/advisories/31168","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31168"},{"reference_url":"http://secunia.com/advisories/34388","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34388"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34340","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34340"},{"reference_url":"https://issues.rpath.com/browse/RPL-1381","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1381"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=508653&group_id=5624"},{"reference_url":"http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/project/shownotes.php?release_id=508656&group_id=5624"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-254.htm"},{"reference_url":"http://www.coresecurity.com/?action=item&id=2148","reference_id":"","reference_type":"","scores":[],"url":"http://www.coresecurity.com/?action=item&id=2148"},{"reference_url":"http://www.debian.org/security/2008/dsa-1613","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2008/dsa-1613"},{"reference_url":"http://www.debian.org/security/2009/dsa-1750","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1750"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml"},{"reference_url":"http://www.kb.cert.org/vuls/id/684664","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/684664"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:116","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:116"},{"reference_url":"http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/l/li/libpng/libpng-1.2.17-ADVISORY.txt"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_13_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0356.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0356.html"},{"reference_url":"http://www.securityfocus.com/archive/1/468910/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/468910/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/489135/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/489135/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24000","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24000"},{"reference_url":"http://www.securityfocus.com/bid/24023","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24023"},{"reference_url":"http://www.securitytracker.com/id?1018078","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018078"},{"reference_url":"http://www.trustix.org/errata/2007/0019/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2007/0019/"},{"reference_url":"http://www.ubuntu.com/usn/usn-472-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-472-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1838","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1838"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2385","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2385"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0924/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0924/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=239425","reference_id":"239425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=239425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:png_reference_library:libpng:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2445","reference_id":"CVE-2007-2445","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2445"},{"reference_url":"https://security.gentoo.org/glsa/200705-24","reference_id":"GLSA-200705-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200705-24"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0356","reference_id":"RHSA-2007:0356","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0356"},{"reference_url":"https://usn.ubuntu.com/472-1/","reference_id":"USN-472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-2445"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-45dp-3xz9-qyd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48509?format=json","vulnerability_id":"VCID-4whv-m6bm-v7a9","summary":"A buffer underflow vulnerability and an information disclosure\n    vulnerability have been discovered in OpenSSL.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3108.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3108","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36361","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36306","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36244","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3108"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=245732","reference_id":"245732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=245732"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=438142","reference_id":"438142","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=438142"},{"reference_url":"https://security.gentoo.org/glsa/200710-06","reference_id":"GLSA-200710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-06"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0813","reference_id":"RHSA-2007:0813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0964","reference_id":"RHSA-2007:0964","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1003","reference_id":"RHSA-2007:1003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1003"},{"reference_url":"https://usn.ubuntu.com/522-1/","reference_id":"USN-522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/522-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-3108"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4whv-m6bm-v7a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56018?format=json","vulnerability_id":"VCID-5wr7-u8pq-dyfp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0160.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0160.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0160","reference_id":"","reference_type":"","scores":[{"value":"0.94464","scoring_system":"epss","scoring_elements":"0.99995","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0160"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160"},{"reference_url":"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html","reference_id":"000184.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html"},{"reference_url":"http://www.securitytracker.com/id/1030026","reference_id":"1030026","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030026"},{"reference_url":"http://www.securitytracker.com/id/1030074","reference_id":"1030074","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030074"},{"reference_url":"http://www.securitytracker.com/id/1030077","reference_id":"1030077","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030077"},{"reference_url":"http://www.securitytracker.com/id/1030078","reference_id":"1030078","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030078"},{"reference_url":"http://www.securitytracker.com/id/1030079","reference_id":"1030079","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030079"},{"reference_url":"http://www.securitytracker.com/id/1030080","reference_id":"1030080","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030080"},{"reference_url":"http://www.securitytracker.com/id/1030081","reference_id":"1030081","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030081"},{"reference_url":"http://www.securitytracker.com/id/1030082","reference_id":"1030082","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securitytracker.com/id/1030082"},{"reference_url":"https://gist.github.com/chapmajs/10473815","reference_id":"10473815","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://gist.github.com/chapmajs/10473815"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1084875","reference_id":"1084875","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1084875"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Apr/109","reference_id":"109","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://seclists.org/fulldisclosure/2014/Apr/109"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html","reference_id":"131221.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html","reference_id":"131291.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Apr/173","reference_id":"173","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://seclists.org/fulldisclosure/2014/Apr/173"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Apr/190","reference_id":"190","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://seclists.org/fulldisclosure/2014/Apr/190"},{"reference_url":"http://www.exploit-db.com/exploits/32745","reference_id":"32745","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.exploit-db.com/exploits/32745"},{"reference_url":"http://www.exploit-db.com/exploits/32764","reference_id":"32764","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.exploit-db.com/exploits/32764"},{"reference_url":"http://secunia.com/advisories/57347","reference_id":"57347","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/57347"},{"reference_url":"http://secunia.com/advisories/57483","reference_id":"57483","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/57483"},{"reference_url":"http://secunia.com/advisories/57721","reference_id":"57721","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/57721"},{"reference_url":"http://secunia.com/advisories/57836","reference_id":"57836","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/57836"},{"reference_url":"http://secunia.com/advisories/57966","reference_id":"57966","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/57966"},{"reference_url":"http://secunia.com/advisories/57968","reference_id":"57968","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/57968"},{"reference_url":"http://secunia.com/advisories/59139","reference_id":"59139","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/59139"},{"reference_url":"http://secunia.com/advisories/59243","reference_id":"59243","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/59243"},{"reference_url":"http://secunia.com/advisories/59347","reference_id":"59347","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://secunia.com/advisories/59347"},{"reference_url":"http://www.securityfocus.com/bid/66690","reference_id":"66690","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.securityfocus.com/bid/66690"},{"reference_url":"http://www.kb.cert.org/vuls/id/720951","reference_id":"720951","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.kb.cert.org/vuls/id/720951"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743883","reference_id":"743883","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743883"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Apr/90","reference_id":"90","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://seclists.org/fulldisclosure/2014/Apr/90"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Apr/91","reference_id":"91","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://seclists.org/fulldisclosure/2014/Apr/91"},{"reference_url":"http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/","reference_id":"chef-server-11-0-12-release","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/"},{"reference_url":"http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/","reference_id":"chef-server-heartbleed-cve-2014-0160-releases","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/"},{"reference_url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed","reference_id":"cisco-sa-20140409-heartbleed","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed"},{"reference_url":"http://support.citrix.com/article/CTX140605","reference_id":"CTX140605","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://support.citrix.com/article/CTX140605"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32764.py","reference_id":"CVE-2014-0346;CVE-2014-0160;OSVDB-105465","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32764.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32791.c","reference_id":"CVE-2014-0346;CVE-2014-0160;OSVDB-105465","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32791.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32998.c","reference_id":"CVE-2014-0346;CVE-2014-0160;OSVDB-105465","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32998.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32745.py","reference_id":"CVE-2014-0346;OSVDB-105465;CVE-2014-0160","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/32745.py"},{"reference_url":"https://code.google.com/p/mod-spdy/issues/detail?id=85","reference_id":"detail?id=85","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://code.google.com/p/mod-spdy/issues/detail?id=85"},{"reference_url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00","reference_id":"detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841","reference_id":"docview.wss?uid=isg400001841","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001841"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843","reference_id":"docview.wss?uid=isg400001843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg400001843"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661","reference_id":"docview.wss?uid=ssg1S1004661","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21670161","reference_id":"docview.wss?uid=swg21670161","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21670161"},{"reference_url":"http://www.debian.org/security/2014/dsa-2896","reference_id":"dsa-2896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.debian.org/security/2014/dsa-2896"},{"reference_url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/","reference_id":"enterprise-chef-1-4-9-release","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/"},{"reference_url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E","reference_id":"f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01","reference_id":"files?p_Doc_Ref=SEVD%202014-119-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01"},{"reference_url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-1","reference_id":"fsc-2014-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.f-secure.com/en/web/labs_global/fsc-2014-1"},{"reference_url":"https://security.gentoo.org/glsa/201404-07","reference_id":"GLSA-201404-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-07"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"http://heartbleed.com/","reference_id":"heartbleed.com","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://heartbleed.com/"},{"reference_url":"https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html","reference_id":"heartbleed-hearts-continue-to-bleed.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html"},{"reference_url":"http://www.blackberry.com/btsc/KB35882","reference_id":"KB35882","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.blackberry.com/btsc/KB35882"},{"reference_url":"http://marc.info/?l=bugtraq&m=139722163017074&w=2","reference_id":"?l=bugtraq&m=139722163017074&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139722163017074&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139757726426985&w=2","reference_id":"?l=bugtraq&m=139757726426985&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139757726426985&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139757819327350&w=2","reference_id":"?l=bugtraq&m=139757819327350&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139757819327350&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139757919027752&w=2","reference_id":"?l=bugtraq&m=139757919027752&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139757919027752&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139758572430452&w=2","reference_id":"?l=bugtraq&m=139758572430452&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139758572430452&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139765756720506&w=2","reference_id":"?l=bugtraq&m=139765756720506&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139765756720506&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139774054614965&w=2","reference_id":"?l=bugtraq&m=139774054614965&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139774054614965&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139774703817488&w=2","reference_id":"?l=bugtraq&m=139774703817488&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139774703817488&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139808058921905&w=2","reference_id":"?l=bugtraq&m=139808058921905&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139808058921905&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139817685517037&w=2","reference_id":"?l=bugtraq&m=139817685517037&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139817685517037&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139817727317190&w=2","reference_id":"?l=bugtraq&m=139817727317190&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139817727317190&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139817782017443&w=2","reference_id":"?l=bugtraq&m=139817782017443&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139817782017443&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139824923705461&w=2","reference_id":"?l=bugtraq&m=139824923705461&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139824923705461&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139824993005633&w=2","reference_id":"?l=bugtraq&m=139824993005633&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139824993005633&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139833395230364&w=2","reference_id":"?l=bugtraq&m=139833395230364&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139833395230364&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139835815211508&w=2","reference_id":"?l=bugtraq&m=139835815211508&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139835815211508&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139835844111589&w=2","reference_id":"?l=bugtraq&m=139835844111589&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139835844111589&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139836085512508&w=2","reference_id":"?l=bugtraq&m=139836085512508&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139836085512508&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139842151128341&w=2","reference_id":"?l=bugtraq&m=139842151128341&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139842151128341&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139843768401936&w=2","reference_id":"?l=bugtraq&m=139843768401936&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139843768401936&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139869720529462&w=2","reference_id":"?l=bugtraq&m=139869720529462&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139869720529462&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139869891830365&w=2","reference_id":"?l=bugtraq&m=139869891830365&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139869891830365&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139889113431619&w=2","reference_id":"?l=bugtraq&m=139889113431619&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139889113431619&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139889295732144&w=2","reference_id":"?l=bugtraq&m=139889295732144&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139889295732144&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905202427693&w=2","reference_id":"?l=bugtraq&m=139905202427693&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905202427693&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905243827825&w=2","reference_id":"?l=bugtraq&m=139905243827825&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905243827825&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905295427946&w=2","reference_id":"?l=bugtraq&m=139905295427946&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905295427946&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905351928096&w=2","reference_id":"?l=bugtraq&m=139905351928096&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905351928096&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905405728262&w=2","reference_id":"?l=bugtraq&m=139905405728262&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905405728262&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905458328378&w=2","reference_id":"?l=bugtraq&m=139905458328378&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905458328378&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905653828999&w=2","reference_id":"?l=bugtraq&m=139905653828999&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905653828999&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=139905868529690&w=2","reference_id":"?l=bugtraq&m=139905868529690&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=139905868529690&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=140015787404650&w=2","reference_id":"?l=bugtraq&m=140015787404650&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=140015787404650&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=140075368411126&w=2","reference_id":"?l=bugtraq&m=140075368411126&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=140075368411126&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=140724451518351&w=2","reference_id":"?l=bugtraq&m=140724451518351&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=140724451518351&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2","reference_id":"?l=bugtraq&m=140752315422991&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=140752315422991&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=141287864628122&w=2","reference_id":"?l=bugtraq&m=141287864628122&w=2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://marc.info/?l=bugtraq&m=141287864628122&w=2"},{"reference_url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf","reference_id":"mdm_1.5.2.1_Release_Notes.pdf","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf"},{"reference_url":"http://advisories.mageia.org/MGASA-2014-0165.html","reference_id":"MGASA-2014-0165.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://advisories.mageia.org/MGASA-2014-0165.html"},{"reference_url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008","reference_id":"mitel-product-security-advisory-17-0008","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html","reference_id":"msg00061.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html"},{"reference_url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1","reference_id":"NVD_Detail_Rpt.aspx?ID=1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1"},{"reference_url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3","reference_id":"NVD_Detail_Rpt.aspx?ID=3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3"},{"reference_url":"https://blog.torproject.org/blog/openssl-bug-cve-2014-0160","reference_id":"openssl-bug-cve-2014-0160","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://blog.torproject.org/blog/openssl-bug-cve-2014-0160"},{"reference_url":"http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/","reference_id":"openssl-heartbleed-bug-live-blog","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html","reference_id":"opensslheartbleedcve-2014-0160-2188454.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html"},{"reference_url":"http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3","reference_id":"?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3"},{"reference_url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E","reference_id":"re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E"},{"reference_url":"http://cogentdatahub.com/ReleaseNotes.html","reference_id":"ReleaseNotes.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://cogentdatahub.com/ReleaseNotes.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0376","reference_id":"RHSA-2014:0376","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0376"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0376.html","reference_id":"RHSA-2014-0376.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0376.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0377","reference_id":"RHSA-2014:0377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0377"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0377.html","reference_id":"RHSA-2014-0377.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0377.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0378","reference_id":"RHSA-2014:0378","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0378"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0378.html","reference_id":"RHSA-2014-0378.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0378.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0396","reference_id":"RHSA-2014:0396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0396"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0396.html","reference_id":"RHSA-2014-0396.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2014-0396.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0416","reference_id":"RHSA-2014:0416","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0416"},{"reference_url":"https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd","reference_id":"ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd"},{"reference_url":"http://www.openssl.org/news/secadv_20140407.txt","reference_id":"secadv_20140407.txt","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.openssl.org/news/secadv_20140407.txt"},{"reference_url":"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf","reference_id":"SJHN-7RKGNM_R4_EN.pdf","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf"},{"reference_url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html","reference_id":"sol15159.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html"},{"reference_url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217","reference_id":"sol15159.html?sr=36517217","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217"},{"reference_url":"http://www.splunk.com/view/SP-CAAAMB3","reference_id":"SP-CAAAMB3","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.splunk.com/view/SP-CAAAMB3"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf","reference_id":"ssa-635659.pdf","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf"},{"reference_url":"http://www.us-cert.gov/ncas/alerts/TA14-098A","reference_id":"TA14-098A","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.us-cert.gov/ncas/alerts/TA14-098A"},{"reference_url":"https://usn.ubuntu.com/2165-1/","reference_id":"USN-2165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2165-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-2165-1","reference_id":"USN-2165-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"http://www.ubuntu.com/usn/USN-2165-1"},{"reference_url":"https://filezilla-project.org/versions.php?type=server","reference_id":"versions.php?type=server","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://filezilla-project.org/versions.php?type=server"},{"reference_url":"https://www.cert.fi/en/reports/2014/vulnerability788210.html","reference_id":"vulnerability788210.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-07T13:32:34Z/"}],"url":"https://www.cert.fi/en/reports/2014/vulnerability788210.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2014-0160"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5wr7-u8pq-dyfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48510?format=json","vulnerability_id":"VCID-8tsy-8bd2-7ybe","summary":"A buffer underflow vulnerability and an information disclosure\n    vulnerability have been discovered in OpenSSL.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5135.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5135","reference_id":"","reference_type":"","scores":[{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.9768","published_at":"2026-04-01T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.97686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.97688","published_at":"2026-04-07T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.97692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.97695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-04-11T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.977","published_at":"2026-04-12T12:55:00Z"},{"value":"0.47522","scoring_system":"epss","scoring_elements":"0.97701","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=309801","reference_id":"309801","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=309801"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444435","reference_id":"444435","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=444435"},{"reference_url":"https://security.gentoo.org/glsa/200710-06","reference_id":"GLSA-200710-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-06"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0813","reference_id":"RHSA-2007:0813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0964","reference_id":"RHSA-2007:0964","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0964"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1003","reference_id":"RHSA-2007:1003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1003"},{"reference_url":"https://usn.ubuntu.com/522-1/","reference_id":"USN-522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/522-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-5135"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tsy-8bd2-7ybe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6819?format=json","vulnerability_id":"VCID-a28u-yu15-3qa6","summary":"Use After Free\nMultiple use-after-free vulnerabilities in libxml2 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1969.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1969","reference_id":"","reference_type":"","scores":[{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76415","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76355","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.7637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.76442","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00954","scoring_system":"epss","scoring_elements":"0.7642","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1969"},{"reference_url":"https://bugzilla.gnome.org/show_bug.cgi?id=690202","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.gnome.org/show_bug.cgi?id=690202"},{"reference_url":"http://secunia.com/advisories/53061","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53061"},{"reference_url":"https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f","reference_id":"","reference_type":"","scores":[],"url":"https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/17/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/17/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/19/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/19/1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1817-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1817-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=953722","reference_id":"953722","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=953722"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1969","reference_id":"CVE-2013-1969","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1969"},{"reference_url":"https://security.gentoo.org/glsa/201311-06","reference_id":"GLSA-201311-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-06"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://usn.ubuntu.com/1817-1/","reference_id":"USN-1817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2013-1969"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a28u-yu15-3qa6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6682?format=json","vulnerability_id":"VCID-dtf8-3v7n-yydn","summary":"Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nBuffer overflow in pngpread.c in libpng, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.","references":[{"reference_url":"http://blackberry.com/btsc/KB27244","reference_id":"","reference_type":"","scores":[],"url":"http://blackberry.com/btsc/KB27244"},{"reference_url":"http://code.google.com/p/chromium/issues/detail?id=45983","reference_id":"","reference_type":"","scores":[],"url":"http://code.google.com/p/chromium/issues/detail?id=45983"},{"reference_url":"http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html"},{"reference_url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18","reference_id":"","reference_type":"","scores":[],"url":"http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2010/000105.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2010/000105.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1205.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1205","reference_id":"","reference_type":"","scores":[{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.9461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.94573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.94599","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.94604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.94607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.9458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.94587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1523","scoring_system":"epss","scoring_elements":"0.9459","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1205"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=40798","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.webkit.org/show_bug.cgi?id=40798"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=570451","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=570451"},{"reference_url":"http://secunia.com/advisories/40302","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40302"},{"reference_url":"http://secunia.com/advisories/40336","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40336"},{"reference_url":"http://secunia.com/advisories/40472","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40472"},{"reference_url":"http://secunia.com/advisories/40547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40547"},{"reference_url":"http://secunia.com/advisories/41574","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/41574"},{"reference_url":"http://secunia.com/advisories/42314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42314"},{"reference_url":"http://secunia.com/advisories/42317","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42317"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59815","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59815"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11851","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11851"},{"reference_url":"http://support.apple.com/kb/HT4312","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4312"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://support.apple.com/kb/HT4456","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4456"},{"reference_url":"http://support.apple.com/kb/HT4457","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4457"},{"reference_url":"http://support.apple.com/kb/HT4554","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4554"},{"reference_url":"http://support.apple.com/kb/HT4566","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4566"},{"reference_url":"http://trac.webkit.org/changeset/61816","reference_id":"","reference_type":"","scores":[],"url":"http://trac.webkit.org/changeset/61816"},{"reference_url":"http://www.debian.org/security/2010/dsa-2072","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2072"},{"reference_url":"http://www.libpng.org/pub/png/libpng.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.libpng.org/pub/png/libpng.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:133","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:133"},{"reference_url":"http://www.mozilla.org/security/announce/2010/mfsa2010-41.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.mozilla.org/security/announce/2010/mfsa2010-41.html"},{"reference_url":"http://www.securityfocus.com/bid/41174","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/41174"},{"reference_url":"http://www.ubuntu.com/usn/USN-960-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-960-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2010-0014.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2010-0014.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1612","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1612"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1637","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1637"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1755","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1755"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1837","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1837"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1846","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1846"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1877","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1877"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2491","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2491"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3045","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3045"},{"reference_url":"http://www.vupen.com/english/advisories/2010/3046","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/3046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=608238","reference_id":"608238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=608238"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205","reference_id":"CVE-2010-1205","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/14422.c","reference_id":"CVE-2010-1205","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/14422.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1205","reference_id":"CVE-2010-1205","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1205"},{"reference_url":"https://security.gentoo.org/glsa/201010-01","reference_id":"GLSA-201010-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201010-01"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://security.gentoo.org/glsa/201412-08","reference_id":"GLSA-201412-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-08"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-41","reference_id":"mfsa2010-41","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-41"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0534","reference_id":"RHSA-2010:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0545","reference_id":"RHSA-2010:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0546","reference_id":"RHSA-2010:0546","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0546"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0547","reference_id":"RHSA-2010:0547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0547"},{"reference_url":"https://usn.ubuntu.com/930-4/","reference_id":"USN-930-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/930-4/"},{"reference_url":"https://usn.ubuntu.com/957-1/","reference_id":"USN-957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/957-1/"},{"reference_url":"https://usn.ubuntu.com/958-1/","reference_id":"USN-958-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/958-1/"},{"reference_url":"https://usn.ubuntu.com/960-1/","reference_id":"USN-960-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/960-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2010-1205"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dtf8-3v7n-yydn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49140?format=json","vulnerability_id":"VCID-eft3-z1ht-q3dm","summary":"A vulnerability has been discovered in file allowing for a denial of\n    service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2026.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2026","reference_id":"","reference_type":"","scores":[{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86448","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02975","scoring_system":"epss","scoring_elements":"0.86518","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2026"},{"reference_url":"https://bugs.gentoo.org/show_bug.cgi?id=174217","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.gentoo.org/show_bug.cgi?id=174217"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2026"},{"reference_url":"http://secunia.com/advisories/24918","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24918"},{"reference_url":"http://secunia.com/advisories/25394","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25394"},{"reference_url":"http://secunia.com/advisories/25544","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25544"},{"reference_url":"http://secunia.com/advisories/25578","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25578"},{"reference_url":"https://issues.rpath.com/browse/RPL-1311","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1311"},{"reference_url":"http://sourceforge.net/mailarchive/forum.php?thread_name=755AF709E5B77E6EA58479D5%40foxx.lsit.ucsb.edu&forum_name=amavis-user","reference_id":"","reference_type":"","scores":[],"url":"http://sourceforge.net/mailarchive/forum.php?thread_name=755AF709E5B77E6EA58479D5%40foxx.lsit.ucsb.edu&forum_name=amavis-user"},{"reference_url":"http://www.amavis.org/security/asa-2007-3.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.amavis.org/security/asa-2007-3.txt"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200704-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200704-13.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:114","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:114"},{"reference_url":"http://www.securityfocus.com/archive/1/469520/30/6420/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/469520/30/6420/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24146","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24146"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2071","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2071"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:amavis:virus_scanner:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:amavis:virus_scanner:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:amavis:virus_scanner:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:file:4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gentoo:file:4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:file:4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2026","reference_id":"CVE-2007-2026","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2026"},{"reference_url":"https://security.gentoo.org/glsa/200704-13","reference_id":"GLSA-200704-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-13"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-2026"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eft3-z1ht-q3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32132?format=json","vulnerability_id":"VCID-ev7d-6s86-sfds","summary":"An integer underflow vulnerability has been reported in The Sleuth Kit\n    allowing for the user-assisted execution of arbitrary code.","references":[{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-001.txt.asc"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=305530","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=305530"},{"reference_url":"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2007/May/msg00004.html"},{"reference_url":"http://mx.gw.com/pipermail/file/2007/000161.html","reference_id":"","reference_type":"","scores":[],"url":"http://mx.gw.com/pipermail/file/2007/000161.html"},{"reference_url":"http://openbsd.org/errata40.html#015_file","reference_id":"","reference_type":"","scores":[],"url":"http://openbsd.org/errata40.html#015_file"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1536.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1536","reference_id":"","reference_type":"","scores":[{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97428","published_at":"2026-04-13T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.41927","scoring_system":"epss","scoring_elements":"0.97426","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1536"},{"reference_url":"https://bugs.gentoo.org/show_bug.cgi?id=171452","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.gentoo.org/show_bug.cgi?id=171452"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536"},{"reference_url":"http://secunia.com/advisories/24548","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24548"},{"reference_url":"http://secunia.com/advisories/24592","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24592"},{"reference_url":"http://secunia.com/advisories/24604","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24604"},{"reference_url":"http://secunia.com/advisories/24608","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24608"},{"reference_url":"http://secunia.com/advisories/24616","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24616"},{"reference_url":"http://secunia.com/advisories/24617","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24617"},{"reference_url":"http://secunia.com/advisories/24723","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24723"},{"reference_url":"http://secunia.com/advisories/24754","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24754"},{"reference_url":"http://secunia.com/advisories/25133","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25133"},{"reference_url":"http://secunia.com/advisories/25393","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25393"},{"reference_url":"http://secunia.com/advisories/25402","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25402"},{"reference_url":"http://secunia.com/advisories/25931","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25931"},{"reference_url":"http://secunia.com/advisories/25989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25989"},{"reference_url":"http://secunia.com/advisories/27307","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27307"},{"reference_url":"http://secunia.com/advisories/27314","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27314"},{"reference_url":"http://secunia.com/advisories/29179","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/29179"},{"reference_url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc","reference_id":"","reference_type":"","scores":[],"url":"http://security.freebsd.org/advisories/FreeBSD-SA-07:04.file.asc"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-26.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-26.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200710-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200710-19.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36283","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36283"},{"reference_url":"https://issues.rpath.com/browse/RPL-1148","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1148"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.512926","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.512926"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10658"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-179.htm"},{"reference_url":"http://www.debian.org/security/2007/dsa-1274","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1274"},{"reference_url":"http://www.kb.cert.org/vuls/id/606700","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/606700"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:067","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:067"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_40_file.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_40_file.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_5_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_5_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0124.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0124.html"},{"reference_url":"http://www.securityfocus.com/archive/1/477861/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/477861/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/477950/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/477950/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/23021","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23021"},{"reference_url":"http://www.securitytracker.com/id?1017796","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017796"},{"reference_url":"http://www.ubuntu.com/usn/usn-439-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-439-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1040","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1040"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1939","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1939"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=233164","reference_id":"233164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=233164"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=415362","reference_id":"415362","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=415362"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:file:file:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:file:file:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:file:file:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1536","reference_id":"CVE-2007-1536","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1536"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/29753.c","reference_id":"CVE-2007-1536;OSVDB-34285","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/29753.c"},{"reference_url":"https://www.securityfocus.com/bid/23021/info","reference_id":"CVE-2007-1536;OSVDB-34285","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/23021/info"},{"reference_url":"https://security.gentoo.org/glsa/200703-26","reference_id":"GLSA-200703-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-26"},{"reference_url":"https://security.gentoo.org/glsa/200710-19","reference_id":"GLSA-200710-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-19"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0124","reference_id":"RHSA-2007:0124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0124"},{"reference_url":"https://usn.ubuntu.com/439-1/","reference_id":"USN-439-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/439-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-1536"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ev7d-6s86-sfds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36545?format=json","vulnerability_id":"VCID-h5vb-1c3n-gfbf","summary":"A buffer overflow in the Regular Expression engine in Perl possibly allows\n    for the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5116.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5116.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5116","reference_id":"","reference_type":"","scores":[{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08802","scoring_system":"epss","scoring_elements":"0.92527","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=323571","reference_id":"323571","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=323571"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450794","reference_id":"450794","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=450794"},{"reference_url":"https://security.gentoo.org/glsa/200711-28","reference_id":"GLSA-200711-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-28"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0966","reference_id":"RHSA-2007:0966","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:1011","reference_id":"RHSA-2007:1011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:1011"},{"reference_url":"https://usn.ubuntu.com/552-1/","reference_id":"USN-552-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/552-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-5116"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h5vb-1c3n-gfbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36077?format=json","vulnerability_id":"VCID-jz8v-ckq8-5ug7","summary":"Multiple vulnerabilities have been discovered in CUPS, allowing for the\n    remote execution of arbitrary code and a Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5849.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5849","reference_id":"","reference_type":"","scores":[{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96973","published_at":"2026-04-01T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.96999","published_at":"2026-04-11T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.97","published_at":"2026-04-12T12:55:00Z"},{"value":"0.3458","scoring_system":"epss","scoring_elements":"0.97001","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=415131","reference_id":"415131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=415131"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457453","reference_id":"457453","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457453"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30898.pl","reference_id":"CVE-2007-5849;OSVDB-40719","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30898.pl"},{"reference_url":"https://www.securityfocus.com/bid/26917/info","reference_id":"CVE-2007-5849;OSVDB-40719","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/26917/info"},{"reference_url":"https://security.gentoo.org/glsa/200712-14","reference_id":"GLSA-200712-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-14"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://usn.ubuntu.com/563-1/","reference_id":"USN-563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-5849"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jz8v-ckq8-5ug7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6833?format=json","vulnerability_id":"VCID-nrut-syek-s7fg","summary":"Improper Restriction of Operations within the Bounds of a Memory Buffer\nparser.c in libxml2, as used in Google Chrome and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.","references":[{"reference_url":"ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz","reference_id":"","reference_type":"","scores":[],"url":"ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz"},{"reference_url":"http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1","reference_id":"","reference_type":"","scores":[],"url":"http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1"},{"reference_url":"http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2877.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2877","reference_id":"","reference_type":"","scores":[{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70229","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70633","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2877"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=229019","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=229019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2869","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2869"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2878","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2878"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2879","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2879"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2880"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Dec/23","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2014/Dec/23"},{"reference_url":"http://secunia.com/advisories/54172","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/54172"},{"reference_url":"http://secunia.com/advisories/55568","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55568"},{"reference_url":"http://www.debian.org/security/2013/dsa-2724","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2724"},{"reference_url":"http://www.debian.org/security/2013/dsa-2779","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2779"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"},{"reference_url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/534161/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/61050","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/61050"},{"reference_url":"http://www.ubuntu.com/usn/USN-1904-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1904-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-1904-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1904-2"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0012.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715531","reference_id":"715531","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715531"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=983204","reference_id":"983204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=983204"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.41:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.41:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.41:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.43:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.43:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.43:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.44:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.44:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.44:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.46:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.46:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.46:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.47:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.47:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.47:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.48:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.48:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.48:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.49:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.49:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.49:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.58:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.58:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.58:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.59:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.59:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.59:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:*:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2877","reference_id":"CVE-2013-2877","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2877"},{"reference_url":"https://security.gentoo.org/glsa/201309-16","reference_id":"GLSA-201309-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-16"},{"reference_url":"https://security.gentoo.org/glsa/201311-06","reference_id":"GLSA-201311-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-06"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0513","reference_id":"RHSA-2014:0513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0513"},{"reference_url":"https://usn.ubuntu.com/1904-1/","reference_id":"USN-1904-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1904-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2013-2877"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrut-syek-s7fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42674?format=json","vulnerability_id":"VCID-t88t-p8tx-cfcu","summary":"Multiple vulnerabilities have been found in libxml2, allowing\n    remote attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html"},{"reference_url":"http://bugs.python.org/issue17239","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://bugs.python.org/issue17239"},{"reference_url":"http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0657.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-0657.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0658.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-0658.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0670.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-0670.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1664.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1664","reference_id":"","reference_type":"","scores":[{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.8834","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03938","scoring_system":"epss","scoring_elements":"0.88285","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1664"},{"reference_url":"https://bugs.launchpad.net/nova/+bug/1100282","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.launchpad.net/nova/+bug/1100282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664"},{"reference_url":"https://github.com/django/django","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django"},{"reference_url":"https://github.com/django/django/commit/1c60d07ba23e0350351c278ad28d0bd5aa410b40","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django/commit/1c60d07ba23e0350351c278ad28d0bd5aa410b40"},{"reference_url":"https://github.com/django/django/commit/d19a27066b2247102e65412aa66917aff0091112","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/django/django/commit/d19a27066b2247102e65412aa66917aff0091112"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1664","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1664"},{"reference_url":"http://ubuntu.com/usn/usn-1757-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-1757-1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/19/2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/02/19/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/19/4","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2013/02/19/4"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700948","reference_id":"700948","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700948"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700949","reference_id":"700949","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700949"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700950","reference_id":"700950","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=913808","reference_id":"913808","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=913808"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cinder_folsom:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:cinder_folsom:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cinder_folsom:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:compute_\\(nova\\)_essex:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:compute_\\(nova\\)_essex:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:compute_\\(nova\\)_essex:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:compute_\\(nova\\)_folsom:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:compute_\\(nova\\)_folsom:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:compute_\\(nova\\)_folsom:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:folsom:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:grizzly:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:grizzly:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:grizzly:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone_essex:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:keystone_essex:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone_essex:-:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/advisories/GHSA-qrh7-x6fp-c2mp","reference_id":"GHSA-qrh7-x6fp-c2mp","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qrh7-x6fp-c2mp"},{"reference_url":"https://security.gentoo.org/glsa/201311-06","reference_id":"GLSA-201311-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-06"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0596","reference_id":"RHSA-2013:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0657","reference_id":"RHSA-2013:0657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0658","reference_id":"RHSA-2013:0658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0670","reference_id":"RHSA-2013:0670","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0670"},{"reference_url":"https://usn.ubuntu.com/1730-1/","reference_id":"USN-1730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1730-1/"},{"reference_url":"https://usn.ubuntu.com/1731-1/","reference_id":"USN-1731-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1731-1/"},{"reference_url":"https://usn.ubuntu.com/1734-1/","reference_id":"USN-1734-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1734-1/"},{"reference_url":"https://usn.ubuntu.com/1757-1/","reference_id":"USN-1757-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1757-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2013-1664","GHSA-qrh7-x6fp-c2mp"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t88t-p8tx-cfcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56194?format=json","vulnerability_id":"VCID-wpkz-zjfa-eqdt","summary":"Multiple vulnerabilities have been found in AMD64 x86 emulation\n    base libraries, the worst of which may allow remote execution of arbitrary\n    code.","references":[{"reference_url":"http://osvdb.org/36179","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/36179"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2741.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2741","reference_id":"","reference_type":"","scores":[{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94621","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94634","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94646","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.9465","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15465","scoring_system":"epss","scoring_elements":"0.94655","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2741"},{"reference_url":"http://scary.beasts.org/security/CESA-2007-001.html","reference_id":"","reference_type":"","scores":[],"url":"http://scary.beasts.org/security/CESA-2007-001.html"},{"reference_url":"http://secunia.com/advisories/25294","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25294"},{"reference_url":"http://secunia.com/advisories/27756","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27756"},{"reference_url":"http://secunia.com/advisories/32282","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32282"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34331","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34331"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:238","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:238"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_24_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_24_sr.html"},{"reference_url":"http://www.securityfocus.com/bid/24001","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24001"},{"reference_url":"http://www.ubuntu.com/usn/usn-652-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-652-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1837","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1837"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:littlecms:lcms:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2741","reference_id":"CVE-2007-2741","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2741"},{"reference_url":"https://security.gentoo.org/glsa/201412-08","reference_id":"GLSA-201412-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-08"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://usn.ubuntu.com/652-1/","reference_id":"USN-652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/652-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-2741"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpkz-zjfa-eqdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56196?format=json","vulnerability_id":"VCID-xyfm-qdqz-93dy","summary":"Multiple vulnerabilities have been found in AMD64 x86 emulation\n    base libraries, the worst of which may allow remote execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5268.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5268.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5268","reference_id":"","reference_type":"","scores":[{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93728","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93731","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.9374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11915","scoring_system":"epss","scoring_elements":"0.93748","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5268"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=324751","reference_id":"324751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=324751"},{"reference_url":"https://security.gentoo.org/glsa/200711-08","reference_id":"GLSA-200711-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200711-08"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://usn.ubuntu.com/538-1/","reference_id":"USN-538-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/538-1/"},{"reference_url":"https://usn.ubuntu.com/730-1/","reference_id":"USN-730-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/730-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-5268"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyfm-qdqz-93dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56193?format=json","vulnerability_id":"VCID-yfs7-zgxf-43hy","summary":"Multiple vulnerabilities have been found in AMD64 x86 emulation\n    base libraries, the worst of which may allow remote execution of arbitrary\n    code.","references":[{"reference_url":"http://docs.info.apple.com/article.html?artnum=305214","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=305214"},{"reference_url":"http://fedoranews.org/cms/node/2785","reference_id":"","reference_type":"","scores":[],"url":"http://fedoranews.org/cms/node/2785"},{"reference_url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0720.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0720","reference_id":"","reference_type":"","scores":[{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.95008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.94972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.94982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.94983","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.94986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.94994","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.94998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.95003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17144","scoring_system":"epss","scoring_elements":"0.95005","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0720"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=232243","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=232243"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720"},{"reference_url":"http://secunia.com/advisories/24479","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24479"},{"reference_url":"http://secunia.com/advisories/24517","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24517"},{"reference_url":"http://secunia.com/advisories/24530","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24530"},{"reference_url":"http://secunia.com/advisories/24660","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24660"},{"reference_url":"http://secunia.com/advisories/24878","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24878"},{"reference_url":"http://secunia.com/advisories/24895","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24895"},{"reference_url":"http://secunia.com/advisories/25119","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25119"},{"reference_url":"http://secunia.com/advisories/25497","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25497"},{"reference_url":"http://secunia.com/advisories/26083","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26083"},{"reference_url":"http://secunia.com/advisories/26413","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26413"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200703-28.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200703-28.xml"},{"reference_url":"https://issues.rpath.com/browse/RPL-1173","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1173"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11046","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11046"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-194.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-194.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:086","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:086"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_14_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_14_sr.html"},{"reference_url":"http://www.novell.com/linux/security/advisories/2007_9_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2007_9_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0123.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0123.html"},{"reference_url":"http://www.securityfocus.com/archive/1/463846/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/463846/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/22948","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22948"},{"reference_url":"http://www.securityfocus.com/bid/23127","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23127"},{"reference_url":"http://www.securitytracker.com/id?1017750","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017750"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA07-072A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0930","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0930"},{"reference_url":"http://www.vupen.com/english/advisories/2007/0949","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/0949"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618271","reference_id":"1618271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=434734","reference_id":"434734","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=434734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cups:cups:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:cups:cups:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:cups:cups:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0720","reference_id":"CVE-2007-0720","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0720"},{"reference_url":"https://security.gentoo.org/glsa/200703-28","reference_id":"GLSA-200703-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200703-28"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0123","reference_id":"RHSA-2007:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0123"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-0720"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfs7-zgxf-43hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6892?format=json","vulnerability_id":"VCID-yj1q-xst4-y7eb","summary":"Uncontrolled Resource Consumption\nlibxml2 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0339.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0339","reference_id":"","reference_type":"","scores":[{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82656","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82709","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82727","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01783","scoring_system":"epss","scoring_elements":"0.82724","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702260","reference_id":"702260","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702260"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=915149","reference_id":"915149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=915149"},{"reference_url":"https://nvd.nist.gov/vuln/detail/cve-2013-0339","reference_id":"CVE-2013-0339","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/cve-2013-0339"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://usn.ubuntu.com/1904-1/","reference_id":"USN-1904-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1904-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2013-0339"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yj1q-xst4-y7eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34870?format=json","vulnerability_id":"VCID-z2kn-pwrf-wffp","summary":"OpenSSL contains a vulnerability allowing execution of arbitrary code or a\n    Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4995.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4995","reference_id":"","reference_type":"","scores":[{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93263","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93276","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93285","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93289","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10617","scoring_system":"epss","scoring_elements":"0.93291","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=321191","reference_id":"321191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=321191"},{"reference_url":"https://security.gentoo.org/glsa/200710-30","reference_id":"GLSA-200710-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-30"},{"reference_url":"https://security.gentoo.org/glsa/201412-11","reference_id":"GLSA-201412-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0964","reference_id":"RHSA-2007:0964","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0964"},{"reference_url":"https://usn.ubuntu.com/534-1/","reference_id":"USN-534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/82960?format=json","purl":"pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}],"aliases":["CVE-2007-4995"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z2kn-pwrf-wffp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/emul-linux-x86-baselibs@20140406-r1"}