Lookup for vulnerable packages by Package URL.

GET /api/packages/83156?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
    "type": "ebuild",
    "namespace": "media-gfx",
    "name": "gimp",
    "version": "2.6.12-r2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.8.0",
    "latest_non_vulnerable_version": "3.0.6",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56767?format=api",
            "vulnerability_id": "VCID-23ev-8ph6-qyd8",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/03/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/03/2"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/04/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/04/7"
                },
                {
                    "reference_url": "http://osvdb.org/70282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/70282"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4540.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4540.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89681",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89549",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89553",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89566",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89583",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89595",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89594",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89601",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89603",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89613",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89617",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89645",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89657",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89653",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.04891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89663",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42771"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44750"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48236"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50737"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64582"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2426"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0016"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "608497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793",
                    "reference_id": "666793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666793"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4540",
                    "reference_id": "CVE-2010-4540",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4540"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0838",
                    "reference_id": "RHSA-2011:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0839",
                    "reference_id": "RHSA-2011:0839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0839"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1109-1/",
                    "reference_id": "USN-1109-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1109-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2010-4540"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23ev-8ph6-qyd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56764?format=api",
            "vulnerability_id": "VCID-5ds4-62sx-xud3",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1570.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1570.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86705",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86716",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86735",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86734",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86762",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86775",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86773",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86768",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86783",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86788",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86785",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86802",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86808",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86829",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86848",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86866",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86862",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86874",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0308",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86907",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1570"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=537356",
                    "reference_id": "537356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537356"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555929",
                    "reference_id": "555929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555929"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0837",
                    "reference_id": "RHSA-2011:0837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0838",
                    "reference_id": "RHSA-2011:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0838"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/880-1/",
                    "reference_id": "USN-880-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/880-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2009-1570"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ds4-62sx-xud3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56774?format=api",
            "vulnerability_id": "VCID-8fnp-pegd-vkf3",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1181.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1181.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3402.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3402.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81756",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81495",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81506",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81528",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81526",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81559",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81579",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81567",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81597",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81598",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81603",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81625",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81633",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81638",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81653",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81675",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81699",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81698",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81715",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3402"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/attachment.cgi?id=603059&action=diff",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/attachment.cgi?id=603059&action=diff"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3402"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50737"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/08/20/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/08/20/6"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027411",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027411"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=838941",
                    "reference_id": "838941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=838941"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3402",
                    "reference_id": "CVE-2012-3402",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3402"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1181",
                    "reference_id": "RHSA-2012:1181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1181"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2012-3402"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fnp-pegd-vkf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56769?format=api",
            "vulnerability_id": "VCID-bq1c-u55x-5beh",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/03/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/03/2"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/04/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/04/7"
                },
                {
                    "reference_url": "http://osvdb.org/70283",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/70283"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4542.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4542.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88034",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87858",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87868",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87881",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87884",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87906",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87912",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87924",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8793",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87929",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87946",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87953",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87952",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87963",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87977",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87993",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87991",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.03676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88003",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42771"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44750"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48236"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50737"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2426"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0016"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "608497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703405",
                    "reference_id": "703405",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703405"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4542",
                    "reference_id": "CVE-2010-4542",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4542"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0838",
                    "reference_id": "RHSA-2011:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0839",
                    "reference_id": "RHSA-2011:0839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0839"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1109-1/",
                    "reference_id": "USN-1109-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1109-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2010-4542"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bq1c-u55x-5beh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56768?format=api",
            "vulnerability_id": "VCID-cdfh-uhac-sbam",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/03/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/03/2"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/04/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/04/7"
                },
                {
                    "reference_url": "http://osvdb.org/70281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/70281"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4541.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4541.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86857",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86814",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86826",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8667",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86689",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86688",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86707",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86717",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8673",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86727",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86721",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86735",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8674",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86737",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86754",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86761",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86762",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86783",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86801",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86819",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8843",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42771"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44750"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48236"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50737"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64581"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2426"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0016"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "608497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703403",
                    "reference_id": "703403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703403"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4541",
                    "reference_id": "CVE-2010-4541",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4541"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0837",
                    "reference_id": "RHSA-2011:0837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0838",
                    "reference_id": "RHSA-2011:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0839",
                    "reference_id": "RHSA-2011:0839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0839"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1109-1/",
                    "reference_id": "USN-1109-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1109-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2010-4541"
            ],
            "risk_score": 4.2,
            "exploitability": "0.5",
            "weighted_severity": "8.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cdfh-uhac-sbam"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56770?format=api",
            "vulnerability_id": "VCID-svvz-6tap-wqbe",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/03/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/03/2"
                },
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2011/01/04/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2011/01/04/7"
                },
                {
                    "reference_url": "http://osvdb.org/70284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/70284"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4543.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4543.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9593",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95833",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95841",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95849",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95852",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95861",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95868",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95867",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95869",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95881",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95886",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95888",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95889",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9589",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95903",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95905",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9591",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95913",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.22756",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95918",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4543"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42771"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44750"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48236"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50737"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2426"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:103"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0839.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0016"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497",
                    "reference_id": "608497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=703407",
                    "reference_id": "703407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=703407"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:2.6.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4543",
                    "reference_id": "CVE-2010-4543",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4543"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35162.cob",
                    "reference_id": "CVE-2010-4543;OSVDB-70284",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35162.cob"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/45647/info",
                    "reference_id": "CVE-2010-4543;OSVDB-70284",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/45647/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0837",
                    "reference_id": "RHSA-2011:0837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0838",
                    "reference_id": "RHSA-2011:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0839",
                    "reference_id": "RHSA-2011:0839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0839"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1109-1/",
                    "reference_id": "USN-1109-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1109-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2010-4543"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svvz-6tap-wqbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56765?format=api",
            "vulnerability_id": "VCID-tq1x-gwac-6uc9",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3909.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3909.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91348",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91289",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91288",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91304",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9132",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9133",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91328",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91337",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91254",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91253",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91277",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06708",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91279",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93599",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93607",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93609",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93618",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93621",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93625",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.11539",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9359",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3909"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=537370",
                    "reference_id": "537370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537370"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=556750",
                    "reference_id": "556750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=556750"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1181",
                    "reference_id": "RHSA-2012:1181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1181"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/880-1/",
                    "reference_id": "USN-880-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/880-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2009-3909"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tq1x-gwac-6uc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56771?format=api",
            "vulnerability_id": "VCID-u8j3-25up-5bcb",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.gnome.org/browse/gimp/commit/?id=a9671395f6573e90316a9d748588c5435216f6ce"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1178.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1178.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8462",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84379",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84393",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84416",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84438",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84443",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84461",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84455",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84451",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84473",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84474",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84476",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84503",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84512",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84516",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84533",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84559",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84576",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84573",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.02208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8459",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1178"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1178"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50737"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201209-23.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-201209-23.xml"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1025586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1025586"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67787"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:110"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0837.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0838.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/48057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/48057"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=689831",
                    "reference_id": "689831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689831"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1178",
                    "reference_id": "CVE-2011-1178",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1178"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0837",
                    "reference_id": "RHSA-2011:0837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0837"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0838",
                    "reference_id": "RHSA-2011:0838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0838"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2011-1178"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8j3-25up-5bcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56773?format=api",
            "vulnerability_id": "VCID-wbtb-bfgn-4bhq",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2763.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2763.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99513",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99512",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99515",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99516",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99519",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9952",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99521",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99524",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99525",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99526",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99527",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.88834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2763"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=824541",
                    "reference_id": "824541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824541"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18956.c",
                    "reference_id": "CVE-2012-2763;OSVDB-82429",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/18956.c"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18973.rb",
                    "reference_id": "CVE-2012-2763;OSVDB-82429",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18973.rb"
                },
                {
                    "reference_url": "http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html",
                    "reference_id": "CVE-2012-2763;OSVDB-82429",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2012-2763"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbtb-bfgn-4bhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56772?format=api",
            "vulnerability_id": "VCID-y7a9-2p1n-z7fx",
            "summary": "Multiple vulnerabilities have been found in GIMP, the worst of\n    which allow execution of arbitrary code or Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2896.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91578",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91584",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91606",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91612",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91616",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91618",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91615",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91637",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9163",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91629",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91636",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91635",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91632",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91645",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91658",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91668",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91666",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91676",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.07216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91683",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2896"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753",
                    "reference_id": "643753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643753"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800",
                    "reference_id": "727800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727800"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201209-23",
                    "reference_id": "GLSA-201209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201209-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1635",
                    "reference_id": "RHSA-2011:1635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0302",
                    "reference_id": "RHSA-2012:0302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1180",
                    "reference_id": "RHSA-2012:1180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1180"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1181",
                    "reference_id": "RHSA-2012:1181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1181"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1207-1/",
                    "reference_id": "USN-1207-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1207-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1214-1/",
                    "reference_id": "USN-1214-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1214-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83156?format=api",
                    "purl": "pkg:ebuild/media-gfx/gimp@2.6.12-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
                }
            ],
            "aliases": [
                "CVE-2011-2896"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y7a9-2p1n-z7fx"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/gimp@2.6.12-r2"
}