Lookup for vulnerable packages by Package URL.

GET /api/packages/930300?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api",
    "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "lz4",
    "version": "1.10.0-4",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.10.0-6",
    "latest_non_vulnerable_version": "1.10.0-10",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56282?format=api",
            "vulnerability_id": "VCID-4gmw-eahs-2fg9",
            "summary": "A vulnerability has been discovered in LZ4, which can lead to memory corruption.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33539",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33243",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33388",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33369",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33287",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33176",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33691",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33562",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33606",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33592",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33547",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34261",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34274",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3520"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954559",
                    "reference_id": "1954559",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954559"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987856",
                    "reference_id": "987856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987856"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-27",
                    "reference_id": "ASA-202105-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-27"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1889",
                    "reference_id": "AVG-1889",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1889"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520",
                    "reference_id": "CVE-2021-3520",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202406-04",
                    "reference_id": "GLSA-202406-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202406-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2575",
                    "reference_id": "RHSA-2021:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1345",
                    "reference_id": "RHSA-2022:1345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5606",
                    "reference_id": "RHSA-2022:5606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5606"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6407",
                    "reference_id": "RHSA-2022:6407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6407"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4968-1/",
                    "reference_id": "USN-4968-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4968-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4968-2/",
                    "reference_id": "USN-4968-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4968-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3520"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gmw-eahs-2fg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86219?format=api",
            "vulnerability_id": "VCID-dvc3-wa3b-b3eg",
            "summary": "lz4: LZ4_decompress_generic() integer overflow (32-bit arches)",
            "references": [
                {
                    "reference_url": "http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html"
                },
                {
                    "reference_url": "http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69393",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69231",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69251",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69282",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.693",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69322",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69306",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69317",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69326",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69307",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69358",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69365",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69371",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00594",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6935",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4715"
                },
                {
                    "reference_url": "https://code.google.com/p/lz4/issues/detail?id=134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.google.com/p/lz4/issues/detail?id=134"
                },
                {
                    "reference_url": "https://code.google.com/p/lz4/source/detail?r=119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.google.com/p/lz4/source/detail?r=119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715"
                },
                {
                    "reference_url": "http://secunia.com/advisories/59770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/59770"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115767",
                    "reference_id": "1115767",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115767"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4715",
                    "reference_id": "CVE-2014-4715",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4715"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930296?format=api",
                    "purl": "pkg:deb/debian/lz4@0.0~r119-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@0.0~r119-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-4715"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvc3-wa3b-b3eg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82355?format=api",
            "vulnerability_id": "VCID-vb2b-utc4-2qgf",
            "summary": "lz4: heap-based buffer overflow in LZ4_write32",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17543.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17543.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80675",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8085",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80738",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80754",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80739",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80731",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80768",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80769",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80828",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80683",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80705",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.807",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80728",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81061",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81038",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8107",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81077",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17543"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2"
                },
                {
                    "reference_url": "https://github.com/lz4/lz4/issues/801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/lz4/lz4/issues/801"
                },
                {
                    "reference_url": "https://github.com/lz4/lz4/pull/756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/lz4/lz4/pull/756"
                },
                {
                    "reference_url": "https://github.com/lz4/lz4/pull/760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/lz4/lz4/pull/760"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210723-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20210723-0001/"
                },
                {
                    "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com//security-alerts/cpujul2021.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765316",
                    "reference_id": "1765316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765316"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680",
                    "reference_id": "943680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17543",
                    "reference_id": "CVE-2019-17543",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17543"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11035",
                    "reference_id": "RHSA-2025:11035",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11035"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930301?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-17543"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vb2b-utc4-2qgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86232?format=api",
            "vulnerability_id": "VCID-yg6v-bv7p-m7c4",
            "summary": "lz4: LZ4_decompress_generic() integer overflow",
            "references": [
                {
                    "reference_url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"
                },
                {
                    "reference_url": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html"
                },
                {
                    "reference_url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4611.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4611.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93139",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93061",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9307",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93086",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9309",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93088",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93106",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9311",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93115",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93121",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93117",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93124",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4611"
                },
                {
                    "reference_url": "https://code.google.com/p/lz4/issues/detail?id=52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.google.com/p/lz4/issues/detail?id=52"
                },
                {
                    "reference_url": "https://code.google.com/p/lz4/source/detail?r=118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://code.google.com/p/lz4/source/detail?r=118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611"
                },
                {
                    "reference_url": "http://secunia.com/advisories/59567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/59567"
                },
                {
                    "reference_url": "http://secunia.com/advisories/59770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/59770"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60238"
                },
                {
                    "reference_url": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E"
                },
                {
                    "reference_url": "https://www.securitymouse.com/lms-2014-06-16-5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.securitymouse.com/lms-2014-06-16-5"
                },
                {
                    "reference_url": "https://www.securitymouse.com/lms-2014-06-16-6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.securitymouse.com/lms-2014-06-16-6"
                },
                {
                    "reference_url": "http://twitter.com/djrbliss/statuses/484931749013495809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://twitter.com/djrbliss/statuses/484931749013495809"
                },
                {
                    "reference_url": "http://twitter.com/djrbliss/statuses/485042901399789568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://twitter.com/djrbliss/statuses/485042901399789568"
                },
                {
                    "reference_url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/06/26/24",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/06/26/24"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1030491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1030491"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436",
                    "reference_id": "1112436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112436"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4611",
                    "reference_id": "CVE-2014-4611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2287-1/",
                    "reference_id": "USN-2287-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2287-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2288-1/",
                    "reference_id": "USN-2288-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2288-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2289-1/",
                    "reference_id": "USN-2289-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2289-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2290-1/",
                    "reference_id": "USN-2290-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2290-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930296?format=api",
                    "purl": "pkg:deb/debian/lz4@0.0~r119-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@0.0~r119-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930297?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930295?format=api",
                    "purl": "pkg:deb/debian/lz4@1.9.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930300?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930298?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930299?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062496?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076088?format=api",
                    "purl": "pkg:deb/debian/lz4@1.10.0-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-4611"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6v-bv7p-m7c4"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"
}