Lookup for vulnerable packages by Package URL.

GET /api/packages/942076?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "veyon",
    "version": "4.5.3+repack1-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4.7.5+repack1-1",
    "latest_non_vulnerable_version": "4.9.7+repack1-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41297?format=api",
            "vulnerability_id": "VCID-1d5d-ajfs-tffv",
            "summary": "Multiple vulnerabilities have been found in\n    LibVNCServer/LibVNCClient, the worst of which allows remote attackers to\n    execute arbitrary code when connecting to a malicious server.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9941.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74598",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74728",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74722",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74628",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74634",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74649",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74672",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74651",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74643",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7468",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74688",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74715",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410166",
                    "reference_id": "1410166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410166"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007",
                    "reference_id": "850007",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850007"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-20",
                    "reference_id": "ASA-201701-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-124",
                    "reference_id": "AVG-124",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-124"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201702-24",
                    "reference_id": "GLSA-201702-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201702-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3171-1/",
                    "reference_id": "USN-3171-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3171-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9941"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1d5d-ajfs-tffv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41298?format=api",
            "vulnerability_id": "VCID-377b-31s1-b3ek",
            "summary": "Multiple vulnerabilities have been found in\n    LibVNCServer/LibVNCClient, the worst of which allows remote attackers to\n    execute arbitrary code when connecting to a malicious server.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9942.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74598",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74728",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74722",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74628",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74634",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74649",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74672",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74651",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74643",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7468",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74688",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00836",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74715",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410168",
                    "reference_id": "1410168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410168"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008",
                    "reference_id": "850008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850008"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-20",
                    "reference_id": "ASA-201701-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-124",
                    "reference_id": "AVG-124",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-124"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201702-24",
                    "reference_id": "GLSA-201702-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201702-24"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3171-1/",
                    "reference_id": "USN-3171-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3171-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9942"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-377b-31s1-b3ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30944?format=api",
            "vulnerability_id": "VCID-3817-suhy-xfhd",
            "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20020.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95607",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95616",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95621",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95624",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95632",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95636",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95641",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95643",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95651",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95655",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95656",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95657",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95659",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.2103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95673",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661117",
                    "reference_id": "1661117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661117"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941",
                    "reference_id": "916941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827",
                    "reference_id": "945827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-05",
                    "reference_id": "GLSA-201908-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-06",
                    "reference_id": "GLSA-202006-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202006-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3877-1/",
                    "reference_id": "USN-3877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-1/",
                    "reference_id": "USN-4547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-2/",
                    "reference_id": "USN-4547-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-20020"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3817-suhy-xfhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/218082?format=api",
            "vulnerability_id": "VCID-6gg4-xtn1-3ba9",
            "summary": "On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92097",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92105",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92116",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92127",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9213",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92134",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92141",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92138",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92142",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92139",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.08057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92149",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15261"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt",
                    "reference_id": "CVE-2020-15261",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942080?format=api",
                    "purl": "pkg:deb/debian/veyon@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-15261"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gg4-xtn1-3ba9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38630?format=api",
            "vulnerability_id": "VCID-9nha-t527-rfhs",
            "summary": "Multiple vulnerabilities have been found in LibVNCServer, the worst\n    of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20023.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74918",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74921",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7495",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74957",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74969",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74992",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74971",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74961",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74998",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75005",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74995",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75033",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75038",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75041",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75048",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661128",
                    "reference_id": "1661128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661128"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941",
                    "reference_id": "916941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-05",
                    "reference_id": "GLSA-201908-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3877-1/",
                    "reference_id": "USN-3877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-1/",
                    "reference_id": "USN-4547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-20023"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nha-t527-rfhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30946?format=api",
            "vulnerability_id": "VCID-bngs-4nkn-rbh1",
            "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20022.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9079",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90796",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90818",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90829",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90836",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90844",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90842",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90866",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90864",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90863",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90877",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90875",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90873",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90888",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661123",
                    "reference_id": "1661123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661123"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941",
                    "reference_id": "916941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827",
                    "reference_id": "945827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-05",
                    "reference_id": "GLSA-201908-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-06",
                    "reference_id": "GLSA-202006-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202006-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3877-1/",
                    "reference_id": "USN-3877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-1/",
                    "reference_id": "USN-4547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-2/",
                    "reference_id": "USN-4547-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-20022"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bngs-4nkn-rbh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30945?format=api",
            "vulnerability_id": "VCID-du88-cbhp-rkcc",
            "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20021.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85421",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85433",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85453",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85456",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85477",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85485",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85499",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85498",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85494",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85518",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85522",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85519",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85541",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8555",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85548",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02552",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85566",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661120",
                    "reference_id": "1661120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661120"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941",
                    "reference_id": "916941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827",
                    "reference_id": "945827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-05",
                    "reference_id": "GLSA-201908-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-06",
                    "reference_id": "GLSA-202006-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202006-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3877-1/",
                    "reference_id": "USN-3877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-1/",
                    "reference_id": "USN-4547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-2/",
                    "reference_id": "USN-4547-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-20021"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-du88-cbhp-rkcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57887?format=api",
            "vulnerability_id": "VCID-nrnp-2yeq-y7ap",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6052.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9001",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89927",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89931",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89943",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89966",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89979",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89977",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89985",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89986",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89982",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89999",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89998",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89997",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055"
                },
                {
                    "reference_url": "http://seclists.org/oss-sec/2014/q3/639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/oss-sec/2014/q3/639"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61506"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61682",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61682"
                },
                {
                    "reference_url": "https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
                },
                {
                    "reference_url": "http://ubuntu.com/usn/usn-2365-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://ubuntu.com/usn/usn-2365-1"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3081"
                },
                {
                    "reference_url": "http://www.ocert.org/advisories/ocert-2014-007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ocert.org/advisories/ocert-2014-007.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/25/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70091"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144288",
                    "reference_id": "1144288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144288"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745",
                    "reference_id": "762745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6052",
                    "reference_id": "CVE-2014-6052",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6052"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-07",
                    "reference_id": "GLSA-201507-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1826",
                    "reference_id": "RHSA-2014:1826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1826"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2365-1/",
                    "reference_id": "USN-2365-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2365-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-6052"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nrnp-2yeq-y7ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82899?format=api",
            "vulnerability_id": "VCID-p9tk-fn6b-cbbv",
            "summary": "libvncserver: Multiple heap out-of-bound writes in VNC client code (Incomplete fix for CVE-2018-20019)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20748.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20748.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93246",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93254",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93259",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93258",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93275",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93292",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93297",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93304",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9331",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93307",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93302",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.10572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93308",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671407",
                    "reference_id": "1671407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671407"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920941",
                    "reference_id": "920941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920941"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3877-1/",
                    "reference_id": "USN-3877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-1/",
                    "reference_id": "USN-4547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942079?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.7%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-20748"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p9tk-fn6b-cbbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30947?format=api",
            "vulnerability_id": "VCID-q89b-2emb-j3br",
            "summary": "Multiple vulnerabilities have been found in ssvnc, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20024.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8796",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87964",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87984",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88002",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87995",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87994",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88008",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88007",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88023",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88029",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8804",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-20024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661132",
                    "reference_id": "1661132",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661132"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941",
                    "reference_id": "916941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=916941"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827",
                    "reference_id": "945827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945827"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-05",
                    "reference_id": "GLSA-201908-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-06",
                    "reference_id": "GLSA-202006-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202006-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3877-1/",
                    "reference_id": "USN-3877-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3877-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-1/",
                    "reference_id": "USN-4547-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4547-2/",
                    "reference_id": "USN-4547-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4547-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-20024"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q89b-2emb-j3br"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42294?format=api",
            "vulnerability_id": "VCID-ug79-puqk-33ce",
            "summary": "An integer overflow in TigerVNC might allow remote attackers to\n    execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0113.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0113.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6051.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91224",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91123",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91136",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91144",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91164",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91174",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.912",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91213",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91211",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06605",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9121",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055"
                },
                {
                    "reference_url": "http://seclists.org/oss-sec/2014/q3/639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://seclists.org/oss-sec/2014/q3/639"
                },
                {
                    "reference_url": "http://secunia.com/advisories/61506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/61506"
                },
                {
                    "reference_url": "https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html"
                },
                {
                    "reference_url": "https://www.kde.org/info/security/advisory-20140923-1.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.kde.org/info/security/advisory-20140923-1.txt"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3081"
                },
                {
                    "reference_url": "http://www.ocert.org/advisories/ocert-2014-007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ocert.org/advisories/ocert-2014-007.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/25/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/09/25/11"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70093"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144287",
                    "reference_id": "1144287",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144287"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745",
                    "reference_id": "762745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762745"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libvncserver:libvncserver:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5.z:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6051",
                    "reference_id": "CVE-2014-6051",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6051"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-07",
                    "reference_id": "GLSA-201507-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201507-07"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-36",
                    "reference_id": "GLSA-201612-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201612-36"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1826",
                    "reference_id": "RHSA-2014:1826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0113",
                    "reference_id": "RHSA-2015:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0113"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2365-1/",
                    "reference_id": "USN-2365-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2365-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4587-1/",
                    "reference_id": "USN-4587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942075?format=api",
                    "purl": "pkg:deb/debian/veyon@4.1.4%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.1.4%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942076?format=api",
                    "purl": "pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942074?format=api",
                    "purl": "pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942078?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942077?format=api",
                    "purl": "pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-6051"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ug79-puqk-33ce"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie"
}