{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60893?format=json","vulnerability_id":"VCID-hhef-yk98-4fhh","summary":"Multiple errors in LittleCMS allow for attacks including the remote\n    execution of arbitrary code.","aliases":[{"alias":"CVE-2009-0793"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85488?format=json","purl":"pkg:ebuild/media-libs/lcms@1.18-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/media-libs/lcms@1.18-r1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/128556?format=json","purl":"pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-697d-rrxb-rkbm"},{"vulnerability":"VCID-6dwj-y7qv-bkah"},{"vulnerability":"VCID-8dsm-695w-9yfx"},{"vulnerability":"VCID-d277-taud-kydb"},{"vulnerability":"VCID-g31s-n677-kye3"},{"vulnerability":"VCID-gs9t-z7tn-5fhn"},{"vulnerability":"VCID-hhef-yk98-4fhh"},{"vulnerability":"VCID-ks25-kdxj-m7cr"},{"vulnerability":"VCID-mhvv-yftm-wyek"},{"vulnerability":"VCID-n74p-uev8-v7hc"},{"vulnerability":"VCID-tpv7-d7p6-bbe6"},{"vulnerability":"VCID-tymd-uw95-q7b1"},{"vulnerability":"VCID-uxbc-8sru-c7a6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-0.30.b09%3Farch=el5"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0793.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0793.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0793","reference_id":"","reference_type":"","scores":[{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93337","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93319","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.9332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93287","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10609","scoring_system":"epss","scoring_elements":"0.93289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10736","scoring_system":"epss","scoring_elements":"0.93301","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0793"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=492353","reference_id":"492353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=492353"},{"reference_url":"https://security.gentoo.org/glsa/200904-19","reference_id":"GLSA-200904-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200904-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0377","reference_id":"RHSA-2009:0377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0377"},{"reference_url":"https://usn.ubuntu.com/1043-1/","reference_id":"USN-1043-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1043-1/"}],"weaknesses":[{"cwe_id":476,"name":"NULL Pointer Dereference","description":"A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.1","risk_score":0.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhef-yk98-4fhh"}