QScanner Report Formats

QScanner generates a vulnerability report that includes inventory, metadata, vulnerability, and policy evaluation information. It can generate a report in the following formats.

  • SARIF
  • Table
  • JSON

By default, QScanner generates its report in SARIF and Tabular format. You can also generate report in JSON format using --report-format flag.
To generate QScanner report in a specific format/s, run this command - --report-format <sarif/table/json>.

JSON Report

Here is a sample QScanner report in JSON format.


  {
    "SchemaVersion": 6,
    "Inventory": {
        "SchemaVersion": 5,
        "QScannerVersion": "4.2.0-3-dev",
        "ScansPerformed": [
            {
                "ScanType": "metadata",
                "ScanDuration": 2140065,
                "Status": "SUCCESS"
            },
            {
                "ScanType": "os",
                "Status": "SUCCESS"
            },
            {
                "ScanType": "sca",
                "Status": "SUCCESS"
            }
        ],
        "PackageInfos": [
            {
                "Packages": [
                    {
                        "ID": "acl@2.2.52-2",
                        "Name": "acl",
                        "Version": "2.2.52-2",
                        "SrcName": "acl",
                        "SrcVersion": "2.2.52-2",
                        "Arch": "amd64",
                        "Layer": {
                            "Digest": "sha256:75a822cd7888e394c49828b951061402d31745f596b1f502758570f2d0ee79e2",
                            "DiffID": "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3"
                        },
                        "Licenses": [
                            "LGPL-2.1",
                            "GPL-3.0"
                        ]
                    },
                    {
                        "ID": "adduser@3.113+nmu3",
                        "Name": "adduser",
                        "Version": "3.113+nmu3",
                        "SrcName": "adduser",
                        "SrcVersion": "3.113+nmu3",
                        "Arch": "all",
                        "Layer": {
                            "Digest": "sha256:75a822cd7888e394c49828b951061402d31745f596b1f502758570f2d0ee79e2",
                            "DiffID": "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3"
                        },
                        "Licenses": [
                            "GPL-2.0"
                        ]
                    },
                    {
                        "ID": "apt@1.0.9.8.4",
                        "Name": "apt",
                        "Version": "1.0.9.8.4",
                        "SrcName": "apt",
                        "SrcVersion": "1.0.9.8.4",
                        "Arch": "amd64",
                        "Layer": {
                            "Digest": "sha256:75a822cd7888e394c49828b951061402d31745f596b1f502758570f2d0ee79e2",
                            "DiffID": "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3"
                        },
                        "Licenses": [
                            "GPL-2.0"
                        ]
                    },
                    {
                        "ID": "autoconf@2.69-8",
                        "Name": "autoconf",
                        "Version": "2.69-8",
                        "SrcName": "autoconf",
                        "SrcVersion": "2.69-8",
                        "Arch": "all",
                        "Layer": {
                            "Digest": "sha256:871436ab7225503e9e951a7acb7b1689a91a60d033bf8cbabcd40fe5ca4cfc87",
                            "DiffID": "sha256:0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3"
                        },
                        "Licenses": [
                            "GPL-3.0",
                            "GPL-3.0-with-autoconf-exception",
                            "permissive-short-disclaimer",
                            "permissive-long-disclaimer",
                            "permissive-without-disclaimer",
                            "permissive-without-notices-or-disclaimer",
                            "GPL-2.0-with-autoconf-exception",
                            "GPL-2.0",
                            "MIT-X-Consortium",
                            "GPL-3+ with Texinfo exception",
                            "GFDL-1.3+",
                            "GFDL-1.3",
                            "no-modification",
                            "permissive",
                            "other"
                        ]
                    },
                    {
                        "ID": "libharfbuzz0b:amd64@0.9.35-2",
                        "Name": "libharfbuzz0b:amd64",
                        "Version": "0.9.35-2",
                        "SrcName": "harfbuzz",
                        "SrcVersion": "0.9.35-2",
                        "Arch": "amd64",
                        "Layer": {
                            "Digest": "sha256:871436ab7225503e9e951a7acb7b1689a91a60d033bf8cbabcd40fe5ca4cfc87",
                            "DiffID": "sha256:0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3"
                        },
                        "Licenses": [
                            "MIT"
                        ]
                    },
                    {
                        "ID": "libhogweed2:amd64@2.7.1-5+deb8u1",
                        "Name": "libhogweed2:amd64",
                        "Version": "2.7.1-5+deb8u1",
                        "SrcName": "nettle",
                        "SrcVersion": "2.7.1-5+deb8u1",
                        "Arch": "amd64",
                        "Layer": {
                            "Digest": "sha256:57de64c72267e88e952b064236cb906c7626f7c07a1a2d5900cf6953e72632b3",
                            "DiffID": "sha256:60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f"
                        }
                    },
                    {
                        "ID": "mercurial-common@3.1.2-2+deb8u3",
                        "Name": "mercurial-common",
                        "Version": "3.1.2-2+deb8u3",
                        "SrcName": "mercurial",
                        "SrcVersion": "3.1.2-2+deb8u3",
                        "Arch": "all",
                        "Layer": {
                            "Digest": "sha256:4306be1e8943b446026b96c2ef7b3ab8471c760774fd1cd11334df7084fed57b",
                            "DiffID": "sha256:53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024"
                        },
                        "Licenses": [
                            "GPL-2.0"
                        ]
                    }, 
                ]
            }
        ],
        "SCAData": {
            "LanguagesDetected": {
                "Ruby": -3737145078316984679
            },
            "Applications": [
                {
                    "Language": "Ruby",
                    "Type": "gemspec",
                    "Libraries": [
                        {
                            "Name": "actioncable",
                            "Version": "5.0.1",
                            "FilePath": "usr/local/bundle/specifications/actioncable-5.0.1.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "actionmailer",
                            "Version": "5.0.1",
                            "FilePath": "usr/local/bundle/specifications/actionmailer-5.0.1.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "bigdecimal",
                            "Version": "1.2.8",
                            "FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/default/bigdecimal-1.2.8.gemspec",
                            "Layer": {
                                "Digest": "sha256:c2807e33cf8416989005a833f0b1cf36ccb635a9c1df5b00dbc1862dfd01330c",
                                "DiffID": "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d"
                            },
                            "Licenses": [
                                "Ruby"
                            ]
                        },
                        {
                            "Name": "builder",
                            "Version": "3.2.2",
                            "FilePath": "usr/local/bundle/specifications/builder-3.2.2.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "bundler",
                            "Version": "1.13.7",
                            "FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/bundler-1.13.7.gemspec",
                            "Layer": {
                                "Digest": "sha256:7025772f9b601093d0f4d16474bab88bca8f180d1e3efcb47899fac48a62c86f",
                                "DiffID": "sha256:2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "concurrent-ruby",
                            "Version": "1.0.4",
                            "FilePath": "usr/local/bundle/specifications/concurrent-ruby-1.0.4.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "mime-types-data",
                            "Version": "3.2016.0521",
                            "FilePath": "usr/local/bundle/specifications/mime-types-data-3.2016.0521.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "mini_portile2",
                            "Version": "2.1.0",
                            "FilePath": "usr/local/bundle/specifications/mini_portile2-2.1.0.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "minitest",
                            "Version": "5.8.5",
                            "FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/minitest-5.8.5.gemspec",
                            "Layer": {
                                "Digest": "sha256:c2807e33cf8416989005a833f0b1cf36ccb635a9c1df5b00dbc1862dfd01330c",
                                "DiffID": "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "net-telnet",
                            "Version": "0.1.1",
                            "FilePath": "usr/local/lib/ruby/gems/2.3.0/specifications/net-telnet-0.1.1.gemspec",
                            "Layer": {
                                "Digest": "sha256:c2807e33cf8416989005a833f0b1cf36ccb635a9c1df5b00dbc1862dfd01330c",
                                "DiffID": "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d"
                            }
                        },
					    {
                            "Name": "websocket-driver",
                            "Version": "0.6.4",
                            "FilePath": "usr/local/bundle/specifications/websocket-driver-0.6.4.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        },
                        {
                            "Name": "websocket-extensions",
                            "Version": "0.1.2",
                            "FilePath": "usr/local/bundle/specifications/websocket-extensions-0.1.2.gemspec",
                            "Layer": {
                                "Digest": "sha256:4cd427c44fca003d57c5ad391bc709131ed308bc8468d9b1331db3f5571bac74",
                                "DiffID": "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                            },
                            "Licenses": [
                                "MIT"
                            ]
                        }
                    ]
                }
            ]
        },
        "Metadata": {
            "OS": {
                "Family": "debian",
                "Name": "Debian Linux 8.6"
            },
            "Architecture": "amd64",
            "ImageMetadata": {
                "ImageID": "sha256:660f41442a278fab36077eaad1cb0bce5e0842b5ad5e34d0e3bb9ccf995391d3",
                "RepoTags": [
                    "rails:latest"
                ],
                "RepoDigests": [
                    "rails@sha256:aec52fe81ff0e99d64174001fbdf44c3bc9e1869756dec05c447f52a0fe637e7"
                ],
                "LayerInventory": {
                    "LayerNumberMap": {
                        "0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3": 5,
                        "0abbaea09fe5ffd3a390647936ff184cecd514c7a9ff7c90a900b790a1e1899e": 6,
                        "10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d": 22,
                        "2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b": 13,
                        "53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024": 4,
                        "60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f": 3,
                        "8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d": 11,
                        "b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3": 1,
                        "c3460377cc14bf15a8c5513180821f8867660765dc466341c15c121b49df20b8": 17,
                        "ed649c99dc69fe0bce1cad0ffd0794cbaf7cd70caaa4ae8c783d7463bdd79c82": 20,
                        "ee7406cd987dac9f2cf5d2aa06a6be4cc3b5b4ade08508680b9378b930174c1c": 19
                    },
                    "LayerInfoList": [
                        {
                            "LayerNum": 1,
                            "LayerContentHash": "b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3",
                            "Command": "ADD file:1d214d2782eaccc743b8d683ccecf2f87f12a0ecdfbcd6fdf4943ce616f23870 in / ",
                            "CreatedAt": 1481667059102
                        },
                        {
                            "LayerNum": 2,
                            "IsEmpty": true,
                            "Command": "CMD [\"/bin/bash\"]",
                            "CreatedAt": 1481667059712
                        },
                        {
                            "LayerNum": 3,
                            "LayerContentHash": "60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f",
                            "Command": "RUN apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tca-certificates \t\tcurl \t\twget \t\u0026\u0026 rm -rf /var/lib/apt/lists/*",
                            "CreatedAt": 1481670011852
                        },
                        {
                            "LayerNum": 4,
                            "LayerContentHash": "53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024",
                            "Command": "RUN apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tbzr \t\tgit \t\tmercurial \t\topenssh-client \t\tsubversion \t\t\t\tprocps \t\u0026\u0026 rm -rf /var/lib/apt/lists/*",
                            "CreatedAt": 1481670033748
                        },
                        {
                            "LayerNum": 5,
                            "LayerContentHash": "0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3",
                            "Command": "RUN apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tautoconf \t\tautomake \t\tbzip2 \t\tfile \t\tg++ \t\tgcc \t\timagemagick \t\tlibbz2-dev \t\tlibc6-dev \t\tlibcurl4-openssl-dev \t\tlibdb-dev \t\tlibevent-dev \t\tlibffi-dev \t\tlibgdbm-dev \t\tlibgeoip-dev \t\tlibglib2.0-dev \t\tlibjpeg-dev \t\tlibkrb5-dev \t\tliblzma-dev \t\tlibmagickcore-dev \t\tlibmagickwand-dev \t\tlibmysqlclient-dev \t\tlibncurses-dev \t\tlibpng-dev \t\tlibpq-dev \t\tlibreadline-dev \t\tlibsqlite3-dev \t\tlibssl-dev \t\tlibtool \t\tlibwebp-dev \t\tlibxml2-dev \t\tlibxslt-dev \t\tlibyaml-dev \t\tmake \t\tpatch \t\txz-utils \t\tzlib1g-dev \t\u0026\u0026 rm -rf /var/lib/apt/lists/*",
                            "CreatedAt": 1481828353028
                        },
                        {
                            "LayerNum": 6,
                            "LayerContentHash": "0abbaea09fe5ffd3a390647936ff184cecd514c7a9ff7c90a900b790a1e1899e",
                            "Command": "RUN mkdir -p /usr/local/etc \t\u0026\u0026 { \t\techo 'install: --no-document'; \t\techo 'update: --no-document'; \t} \u003e\u003e /usr/local/etc/gemrc",
                            "CreatedAt": 1481859043700
                        },
                        {
                            "LayerNum": 7,
                            "IsEmpty": true,
                            "Command": "ENV RUBY_MAJOR=2.3",
                            "CreatedAt": 1481859044009
                        },
                        {
                            "LayerNum": 8,
                            "IsEmpty": true,
                            "Command": "ENV RUBY_VERSION=2.3.3",
                            "CreatedAt": 1481859044199
                        },
                        {
                            "LayerNum": 9,
                            "IsEmpty": true,
                            "Command": "ENV RUBY_DOWNLOAD_SHA256=1a4fa8c2885734ba37b97ffdb4a19b8fba0e8982606db02d936e65bac07419dc",
                            "CreatedAt": 1483566560999
                        },
                        {
                            "LayerNum": 10,
                            "IsEmpty": true,
                            "Command": "ENV RUBYGEMS_VERSION=2.6.8",
                            "CreatedAt": 1483566561319
                        },
                        {
                            "LayerNum": 11,
                            "LayerContentHash": "8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d",
                            "Command": "RUN set -ex \t\t\u0026\u0026 buildDeps=' \t\tbison \t\tlibgdbm-dev \t\truby \t\txz-utils \t' \t\u0026\u0026 apt-get update \t\u0026\u0026 apt-get install -y --no-install-recommends $buildDeps \t\u0026\u0026 rm -rf /var/lib/apt/lists/* \t\t\u0026\u0026 wget -O ruby.tar.xz \"https://cache.ruby-lang.org/pub/ruby/${RUBY_MAJOR%-rc}/ruby-$RUBY_VERSION.tar.xz\" \t\u0026\u0026 echo \"$RUBY_DOWNLOAD_SHA256 *ruby.tar.xz\" | sha256sum -c - \t\t\u0026\u0026 mkdir -p /usr/src/ruby \t\u0026\u0026 tar -xJf ruby.tar.xz -C /usr/src/ruby --strip-components=1 \t\u0026\u0026 rm ruby.tar.xz \t\t\u0026\u0026 cd /usr/src/ruby \t\t\u0026\u0026 { \t\techo '#define ENABLE_PATH_CHECK 0'; \t\techo; \t\tcat file.c; \t} \u003e file.c.new \t\u0026\u0026 mv file.c.new file.c \t\t\u0026\u0026 autoconf \t\u0026\u0026 ./configure --disable-install-doc --enable-shared \t\u0026\u0026 make -j\"$(nproc)\" \t\u0026\u0026 make install \t\t\u0026\u0026 apt-get purge -y --auto-remove $buildDeps \t\u0026\u0026 cd / \t\u0026\u0026 rm -r /usr/src/ruby \t\t\u0026\u0026 gem update --system \"$RUBYGEMS_VERSION\"",
                            "CreatedAt": 1483566705990
                        },
                        {
                            "LayerNum": 12,
                            "IsEmpty": true,
                            "Command": "ENV BUNDLER_VERSION=1.13.7",
                            "CreatedAt": 1483566706367
                        },
                        {
                            "LayerNum": 13,
                            "LayerContentHash": "2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b",
                            "Command": "RUN gem install bundler --version \"$BUNDLER_VERSION\"",
                            "CreatedAt": 1483566707755
                        },
                        {
                            "LayerNum": 14,
                            "IsEmpty": true,
                            "Command": "ENV GEM_HOME=/usr/local/bundle",
                            "CreatedAt": 1483566708059
                        },
                        {
                            "LayerNum": 15,
                            "IsEmpty": true,
                            "Command": "ENV BUNDLE_PATH=/usr/local/bundle BUNDLE_BIN=/usr/local/bundle/bin BUNDLE_SILENCE_ROOT_WARNING=1 BUNDLE_APP_CONFIG=/usr/local/bundle",
                            "CreatedAt": 1483566708315
                        },
                        {
                            "LayerNum": 16,
                            "IsEmpty": true,
                            "Command": "ENV PATH=/usr/local/bundle/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                            "CreatedAt": 1483566708567
                        },
                        {
                            "LayerNum": 17,
                            "LayerContentHash": "c3460377cc14bf15a8c5513180821f8867660765dc466341c15c121b49df20b8",
                            "Command": "RUN mkdir -p \"$GEM_HOME\" \"$BUNDLE_BIN\" \t\u0026\u0026 chmod 777 \"$GEM_HOME\" \"$BUNDLE_BIN\"",
                            "CreatedAt": 1483566709447
                        },
                        {
                            "LayerNum": 18,
                            "IsEmpty": true,
                            "Command": "CMD [\"irb\"]",
                            "CreatedAt": 1483566709751
                        },
                        {
                            "LayerNum": 19,
                            "LayerContentHash": "ee7406cd987dac9f2cf5d2aa06a6be4cc3b5b4ade08508680b9378b930174c1c",
                            "Command": "RUN apt-get update \u0026\u0026 apt-get install -y nodejs --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*",
                            "CreatedAt": 1483729497149
                        },
                        {
                            "LayerNum": 20,
                            "LayerContentHash": "ed649c99dc69fe0bce1cad0ffd0794cbaf7cd70caaa4ae8c783d7463bdd79c82",
                            "Command": "RUN apt-get update \u0026\u0026 apt-get install -y mysql-client postgresql-client sqlite3 --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*",
                            "CreatedAt": 1483729504482
                        },
                        {
                            "LayerNum": 21,
                            "IsEmpty": true,
                            "Command": "ENV RAILS_VERSION=5.0.1",
                            "CreatedAt": 1483729505007
                        },
                        {
                            "LayerNum": 22,
                            "LayerContentHash": "10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d",
                            "Command": "RUN gem install rails --version \"$RAILS_VERSION\"",
                            "CreatedAt": 1483729557372
                        }
                    ]
                },
                "InspectInfo": {
                    "architecture": "amd64",
                    "container": "9a2376ffdcf4184380a0c876e9278c09874fd84a8e51131b8432b4ff6d65e05e",
                    "created": "2017-01-06T19:05:57.372008848Z",
                    "docker_version": "1.12.3",
                    "history": [
                        {
                            "created": "2016-12-13T22:10:59.102721199Z",
                            "created_by": "/bin/sh -c #(nop) ADD file:1d214d2782eaccc743b8d683ccecf2f87f12a0ecdfbcd6fdf4943ce616f23870 in / "
                        },
                        {
                            "created": "2016-12-13T22:10:59.712034744Z",
                            "created_by": "/bin/sh -c #(nop)  CMD [\"/bin/bash\"]",
                            "empty_layer": true
                        },
                        {
                            "created": "2016-12-13T23:00:11.852536913Z",
                            "created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tca-certificates \t\tcurl \t\twget \t\u0026\u0026 rm -rf /var/lib/apt/lists/*"
                        },
                        {
                            "created": "2016-12-13T23:00:33.748130352Z",
                            "created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tbzr \t\tgit \t\tmercurial \t\topenssh-client \t\tsubversion \t\t\t\tprocps \t\u0026\u0026 rm -rf /var/lib/apt/lists/*"
                        },
                        {
                            "created": "2016-12-15T18:59:13.02815109Z",
                            "created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y --no-install-recommends \t\tautoconf \t\tautomake \t\tbzip2 \t\tfile \t\tg++ \t\tgcc \t\timagemagick \t\tlibbz2-dev \t\tlibc6-dev \t\tlibcurl4-openssl-dev \t\tlibdb-dev \t\tlibevent-dev \t\tlibffi-dev \t\tlibgdbm-dev \t\tlibgeoip-dev \t\tlibglib2.0-dev \t\tlibjpeg-dev \t\tlibkrb5-dev \t\tliblzma-dev \t\tlibmagickcore-dev \t\tlibmagickwand-dev \t\tlibmysqlclient-dev \t\tlibncurses-dev \t\tlibpng-dev \t\tlibpq-dev \t\tlibreadline-dev \t\tlibsqlite3-dev \t\tlibssl-dev \t\tlibtool \t\tlibwebp-dev \t\tlibxml2-dev \t\tlibxslt-dev \t\tlibyaml-dev \t\tmake \t\tpatch \t\txz-utils \t\tzlib1g-dev \t\u0026\u0026 rm -rf /var/lib/apt/lists/*"
                        },
                        {
                            "created": "2016-12-16T03:30:43.700704853Z",
                            "created_by": "/bin/sh -c mkdir -p /usr/local/etc \t\u0026\u0026 { \t\techo 'install: --no-document'; \t\techo 'update: --no-document'; \t} \u003e\u003e /usr/local/etc/gemrc"
                        },
                        {
                            "created": "2016-12-16T03:30:44.009782264Z",
                            "created_by": "/bin/sh -c #(nop)  ENV RUBY_MAJOR=2.3",
                            "empty_layer": true
                        },
                        {
                            "created": "2016-12-16T03:30:44.199887515Z",
                            "created_by": "/bin/sh -c #(nop)  ENV RUBY_VERSION=2.3.3",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:49:20.999830706Z",
                            "created_by": "/bin/sh -c #(nop)  ENV RUBY_DOWNLOAD_SHA256=1a4fa8c2885734ba37b97ffdb4a19b8fba0e8982606db02d936e65bac07419dc",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:49:21.31987929Z",
                            "created_by": "/bin/sh -c #(nop)  ENV RUBYGEMS_VERSION=2.6.8",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:51:45.990117975Z",
                            "created_by": "/bin/sh -c set -ex \t\t\u0026\u0026 buildDeps=' \t\tbison \t\tlibgdbm-dev \t\truby \t\txz-utils \t' \t\u0026\u0026 apt-get update \t\u0026\u0026 apt-get install -y --no-install-recommends $buildDeps \t\u0026\u0026 rm -rf /var/lib/apt/lists/* \t\t\u0026\u0026 wget -O ruby.tar.xz \"https://cache.ruby-lang.org/pub/ruby/${RUBY_MAJOR%-rc}/ruby-$RUBY_VERSION.tar.xz\" \t\u0026\u0026 echo \"$RUBY_DOWNLOAD_SHA256 *ruby.tar.xz\" | sha256sum -c - \t\t\u0026\u0026 mkdir -p /usr/src/ruby \t\u0026\u0026 tar -xJf ruby.tar.xz -C /usr/src/ruby --strip-components=1 \t\u0026\u0026 rm ruby.tar.xz \t\t\u0026\u0026 cd /usr/src/ruby \t\t\u0026\u0026 { \t\techo '#define ENABLE_PATH_CHECK 0'; \t\techo; \t\tcat file.c; \t} \u003e file.c.new \t\u0026\u0026 mv file.c.new file.c \t\t\u0026\u0026 autoconf \t\u0026\u0026 ./configure --disable-install-doc --enable-shared \t\u0026\u0026 make -j\"$(nproc)\" \t\u0026\u0026 make install \t\t\u0026\u0026 apt-get purge -y --auto-remove $buildDeps \t\u0026\u0026 cd / \t\u0026\u0026 rm -r /usr/src/ruby \t\t\u0026\u0026 gem update --system \"$RUBYGEMS_VERSION\""
                        },
                        {
                            "created": "2017-01-04T21:51:46.367746702Z",
                            "created_by": "/bin/sh -c #(nop)  ENV BUNDLER_VERSION=1.13.7",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:51:47.755081709Z",
                            "created_by": "/bin/sh -c gem install bundler --version \"$BUNDLER_VERSION\""
                        },
                        {
                            "created": "2017-01-04T21:51:48.059346175Z",
                            "created_by": "/bin/sh -c #(nop)  ENV GEM_HOME=/usr/local/bundle",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:51:48.315736309Z",
                            "created_by": "/bin/sh -c #(nop)  ENV BUNDLE_PATH=/usr/local/bundle BUNDLE_BIN=/usr/local/bundle/bin BUNDLE_SILENCE_ROOT_WARNING=1 BUNDLE_APP_CONFIG=/usr/local/bundle",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:51:48.567797564Z",
                            "created_by": "/bin/sh -c #(nop)  ENV PATH=/usr/local/bundle/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-04T21:51:49.447907783Z",
                            "created_by": "/bin/sh -c mkdir -p \"$GEM_HOME\" \"$BUNDLE_BIN\" \t\u0026\u0026 chmod 777 \"$GEM_HOME\" \"$BUNDLE_BIN\""
                        },
                        {
                            "created": "2017-01-04T21:51:49.751764585Z",
                            "created_by": "/bin/sh -c #(nop)  CMD [\"irb\"]",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-06T19:04:57.149262279Z",
                            "created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y nodejs --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*"
                        },
                        {
                            "created": "2017-01-06T19:05:04.482531966Z",
                            "created_by": "/bin/sh -c apt-get update \u0026\u0026 apt-get install -y mysql-client postgresql-client sqlite3 --no-install-recommends \u0026\u0026 rm -rf /var/lib/apt/lists/*"
                        },
                        {
                            "created": "2017-01-06T19:05:05.00780109Z",
                            "created_by": "/bin/sh -c #(nop)  ENV RAILS_VERSION=5.0.1",
                            "empty_layer": true
                        },
                        {
                            "created": "2017-01-06T19:05:57.372008848Z",
                            "created_by": "/bin/sh -c gem install rails --version \"$RAILS_VERSION\""
                        }
                    ],
                    "os": "linux",
                    "rootfs": {
                        "type": "layers",
                        "diff_ids": [
                            "sha256:b6ca02dfe5e62c58dacb1dec16eb42ed35761c15562485f9da9364bb7c90b9b3",
                            "sha256:60a0858edcd5aad240966e33389850e4328de4cfb5282977eddda56bffc7f95f",
                            "sha256:53c779688d06353f7ba4fd7ce1d43ce146ad0278ebead0feea1846383c730024",
                            "sha256:0a5e2b2ddeaa749d95730bad9be3e3a472ff6f80544da0082a99ba569df34ff3",
                            "sha256:0abbaea09fe5ffd3a390647936ff184cecd514c7a9ff7c90a900b790a1e1899e",
                            "sha256:8449699b33dfd82ec80bce25b7b0fede858df3e907b5d1e2b8fb879ccaf1dc1d",
                            "sha256:2a5f7e9a33c2eaa1168499f77b012c0cad4a313db430c953ae4e36a6daab807b",
                            "sha256:c3460377cc14bf15a8c5513180821f8867660765dc466341c15c121b49df20b8",
                            "sha256:ee7406cd987dac9f2cf5d2aa06a6be4cc3b5b4ade08508680b9378b930174c1c",
                            "sha256:ed649c99dc69fe0bce1cad0ffd0794cbaf7cd70caaa4ae8c783d7463bdd79c82",
                            "sha256:10b40b389ca133b000fb94c19b1cc82a307eacc808b77aa4cf8349389e89eb7d"
                        ]
                    },
                    "config": {
                        "Cmd": [
                            "irb"
                        ],
                        "Env": [
                            "PATH=/usr/local/bundle/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                            "RUBY_MAJOR=2.3",
                            "RUBY_VERSION=2.3.3",
                            "RUBY_DOWNLOAD_SHA256=1a4fa8c2885734ba37b97ffdb4a19b8fba0e8982606db02d936e65bac07419dc",
                            "RUBYGEMS_VERSION=2.6.8",
                            "BUNDLER_VERSION=1.13.7",
                            "GEM_HOME=/usr/local/bundle",
                            "BUNDLE_PATH=/usr/local/bundle",
                            "BUNDLE_BIN=/usr/local/bundle/bin",
                            "BUNDLE_SILENCE_ROOT_WARNING=1",
                            "BUNDLE_APP_CONFIG=/usr/local/bundle",
                            "RAILS_VERSION=5.0.1"
                        ],
                        "Hostname": "45f28166fed1",
                        "Image": "sha256:ed982bb95826ed2370350badb2b3a5759314e4991ced8770138945fda5e41984",
                        "ArgsEscaped": true
                    }
                }
            }
        }
    },
    "VulnerabilityReport": {
        "Status": "279 vulnerabilities found!",
        "details": [
            {
                "title": "Debian Security Update for curl (DLA 1498-1)",
                "qid": 177125,
                "cveids": [
                    "CVE-2018-14618"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u12"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u12"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u12"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u12"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192965",
                "lastFound": "1726570859883",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-fr52-4hqw-p27f)",
                "qid": 988643,
                "cveids": [
                    "CVE-2016-4658"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.7.1",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860488",
                "lastFound": "1726570860488",
                "published": 1667826873000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for mercurial (DLA 1414-1)",
                "qid": 177178,
                "cveids": [
                    "CVE-2017-9462",
                    "CVE-2017-17458",
                    "CVE-2018-1000132",
                    "CVE-2018-13346",
                    "CVE-2018-13347",
                    "CVE-2018-13348"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "mercurial-common",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u5"
                    },
                    {
                        "name": "mercurial",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192967",
                "lastFound": "1726570859885",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for apt (DLA 1637-1)",
                "qid": 176713,
                "cveids": [
                    "CVE-2019-3462"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "6.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.1"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "apt",
                        "version": "1.0.9.8.4",
                        "fixVersion": "1.0.9.8.5"
                    },
                    {
                        "name": "libapt-pkg4.12:amd64",
                        "version": "1.0.9.8.4",
                        "fixVersion": "1.0.9.8.5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192949",
                "lastFound": "1726570859868",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for mercurial (DLA 1414-2)",
                "qid": 177255,
                "cveids": [
                    "CVE-2017-17458"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "mercurial-common",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u6"
                    },
                    {
                        "name": "mercurial",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192969",
                "lastFound": "1726570859887",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionview (GHSA-m63j-wh5w-c252)",
                "qid": 988313,
                "cveids": [
                    "CVE-2019-5419"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "6.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "actionview",
                        "version": "5.0.1",
                        "fixVersion": "5.0.7.2",
                        "packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860239",
                "lastFound": "1726570860239",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for activesupport (GHSA-2p68-f74v-9wc6)",
                "qid": 988041,
                "cveids": [
                    "CVE-2020-8165"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "activesupport",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.3",
                        "packagePath": "usr/local/bundle/specifications/activesupport-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860124",
                "lastFound": "1726570860124",
                "published": 1665668563000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libssh2 (DLA 1730-1)",
                "qid": 176757,
                "cveids": [
                    "CVE-2019-3855",
                    "CVE-2019-3856",
                    "CVE-2019-3857",
                    "CVE-2019-3858",
                    "CVE-2019-3859",
                    "CVE-2019-3860",
                    "CVE-2019-3861",
                    "CVE-2019-3862",
                    "CVE-2019-3863"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "6.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "libssh2-1:amd64",
                        "version": "1.4.3-4.1+deb8u1",
                        "fixVersion": "1.4.3-4.1+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192952",
                "lastFound": "1726570859871",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for git (DLA 2059-1)",
                "qid": 177613,
                "cveids": [
                    "CVE-2019-1348",
                    "CVE-2019-1349",
                    "CVE-2019-1352",
                    "CVE-2019-1353",
                    "CVE-2019-1387"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "6.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u8"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192978",
                "lastFound": "1726570859896",
                "published": 1580987657000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for inetutils (DLA 2176-1)",
                "qid": 177817,
                "cveids": [
                    "CVE-2020-10188"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "inetutils-ping",
                        "version": "2:1.9.2.39.3a460-3",
                        "fixVersion": "2:1.9.2.39.3a460-3+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192981",
                "lastFound": "1726570859899",
                "published": 1592829964000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "EOL/Obsolete Operating System: Debian 8.x Detected",
                "qid": 650049,
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "8.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.4",
                    "temporalScore": "8.6"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "category": "Security Policy",
                "firstFound": "1726223192985",
                "lastFound": "1726570859903",
                "published": 1622639074000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "noPatch": true
                }
            },
            {
                "title": "Debian Security Update for libssh2 (DLA 1730-3)",
                "qid": 177064,
                "cveids": [
                    "CVE-2019-3859",
                    "CVE-2019-13115",
                    "CVE-2019-3855"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "7.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "8.2"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "libssh2-1:amd64",
                        "version": "1.4.3-4.1+deb8u1",
                        "fixVersion": "1.4.3-4.1+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192962",
                "lastFound": "1726570859881",
                "published": 1564398029000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for apt (DLA 1637-1)",
                "qid": 177380,
                "cveids": [
                    "CVE-2019-3462"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "6.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.1"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "apt",
                        "version": "1.0.9.8.4",
                        "fixVersion": "1.0.9.8.5"
                    },
                    {
                        "name": "libapt-pkg4.12:amd64",
                        "version": "1.0.9.8.4",
                        "fixVersion": "1.0.9.8.5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192973",
                "lastFound": "1726570859891",
                "published": 1571137810000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for systemd (DLA 1580-1)",
                "qid": 176823,
                "cveids": [
                    "CVE-2018-1049",
                    "CVE-2018-15686",
                    "CVE-2018-15688"
                ],
                "cvssInfo": {
                    "baseScore": "7.2",
                    "temporalScore": "5.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 5,
                "customerSeverity": 5,
                "risk": 50,
                "software": [
                    {
                        "name": "udev",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u8"
                    },
                    {
                        "name": "libsystemd0:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u8"
                    },
                    {
                        "name": "systemd-sysv",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u8"
                    },
                    {
                        "name": "libudev1:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u8"
                    },
                    {
                        "name": "systemd",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192955",
                "lastFound": "1726570859874",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-6qvp-r6r3-9p7h)",
                "qid": 988211,
                "cveids": [
                    "CVE-2018-14404"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.8.5",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860236",
                "lastFound": "1726570860236",
                "published": 1666790954000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-5f9h-9pjv-v6j7)",
                "qid": 988344,
                "cveids": [
                    "CVE-2020-8161"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.6",
                    "temporalScore": "7.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.1.3",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860316",
                "lastFound": "1726570860316",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-5x79-w82f-gw8w)",
                "qid": 991339,
                "cveids": [
                    "CVE-2022-23517"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rails-html-sanitizer",
                        "version": "1.0.3",
                        "fixVersion": "1.4.4",
                        "packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860627",
                "lastFound": "1726570860627",
                "published": 1672837009000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DSA 4091-1)",
                "qid": 176271,
                "cveids": [
                    "CVE-2018-2562",
                    "CVE-2018-2622",
                    "CVE-2018-2640",
                    "CVE-2018-2665",
                    "CVE-2018-2668"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.1",
                    "temporalScore": "6.2"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.59-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.59-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.59-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.59-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.59-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192939",
                "lastFound": "1726570859860",
                "published": 1516876340000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionview (GHSA-86g5-2wh3-gc9j)",
                "qid": 987995,
                "cveids": [
                    "CVE-2019-5418"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "actionview",
                        "version": "5.0.1",
                        "fixVersion": "5.0.7.2",
                        "packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860008",
                "lastFound": "1726570860008",
                "published": 1665668559000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libbsd (DLA 2052-1)",
                "qid": 177560,
                "cveids": [
                    "CVE-2016-2090"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libbsd0:amd64",
                        "version": "0.7.0-2",
                        "fixVersion": "0.7.0-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192977",
                "lastFound": "1726570859895",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 2049-1)",
                "qid": 177558,
                "cveids": [
                    "CVE-2019-19948",
                    "CVE-2019-19949"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192976",
                "lastFound": "1726570859894",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-j6w9-fv6q-3q52)",
                "qid": 988024,
                "cveids": [
                    "CVE-2020-8184"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.1.4",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860091",
                "lastFound": "1726570860091",
                "published": 1665668561000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rdoc (GHSA-ggxm-pgc9-g7fp)",
                "qid": 988400,
                "cveids": [
                    "CVE-2021-31799"
                ],
                "cvssInfo": {
                    "baseScore": "4.4",
                    "temporalScore": "3.3",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.0",
                    "temporalScore": "6.1"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rdoc",
                        "version": "4.2.1",
                        "fixVersion": "6.3.1",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/default/rdoc-4.2.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860463",
                "lastFound": "1726570860463",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-hjg4-8q5f-x6fm)",
                "qid": 988055,
                "cveids": [
                    "CVE-2021-22885"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.6",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860181",
                "lastFound": "1726570860181",
                "published": 1665668565000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-cr5j-953j-xw5p)",
                "qid": 988040,
                "cveids": [
                    "CVE-2019-5477"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.10.4",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860121",
                "lastFound": "1726570860121",
                "published": 1665668563000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-8727-m6gj-mc37)",
                "qid": 988386,
                "cveids": [
                    "CVE-2020-8164"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.3",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860446",
                "lastFound": "1726570860446",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-gx8x-g87m-h5q6)",
                "qid": 988390,
                "cveids": [
                    "CVE-2022-24839"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.4",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860447",
                "lastFound": "1726570860447",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-7553-jr98-vx47)",
                "qid": 988210,
                "cveids": [
                    "CVE-2020-7595"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.10.8",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860214",
                "lastFound": "1726570860214",
                "published": 1666790954000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Ruby (rubygems) Security Update for nokogiri (GHSA-xh29-r2w5-wx8m)",
                "qid": 987466,
                "cveids": [
                    "CVE-2022-29181"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.2",
                    "temporalScore": "7.4"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.6",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859908",
                "lastFound": "1726570859908",
                "published": 1663677763000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Ruby (rubygems) Security Update for nokogiri (GHSA-crjr-9rc5-ghw8)",
                "qid": 987471,
                "cveids": [
                    "CVE-2022-24836"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.4",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859952",
                "lastFound": "1726570859952",
                "published": 1663677763000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-fr32-gr5c-xq5c)",
                "qid": 987992,
                "cveids": [
                    "CVE-2019-8321"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rubygems-update",
                        "version": "2.6.8",
                        "fixVersion": "2.7.9",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859974",
                "lastFound": "1726570859974",
                "published": 1665668559000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for json (GHSA-jphg-qwrw-7w9g)",
                "qid": 987999,
                "cveids": [
                    "CVE-2020-10663"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "json",
                        "version": "1.8.3",
                        "fixVersion": "2.3.0",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/default/json-1.8.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860049",
                "lastFound": "1726570860049",
                "published": 1665668559000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-4wm8-fjv7-j774)",
                "qid": 988054,
                "cveids": [
                    "CVE-2019-8325"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rubygems-update",
                        "version": "2.6.8",
                        "fixVersion": "2.7.9",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860179",
                "lastFound": "1726570860179",
                "published": 1665668565000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-wq4h-7r42-5hrr)",
                "qid": 988319,
                "cveids": [
                    "CVE-2022-30123"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "10.0",
                    "temporalScore": "8.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.9.1",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860269",
                "lastFound": "1726570860269",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for harfbuzz (DLA 2040-1)",
                "qid": 177889,
                "cveids": [
                    "CVE-2015-8947"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.6",
                    "temporalScore": "6.6"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libharfbuzz0b:amd64",
                        "version": "0.9.35-2",
                        "fixVersion": "0.9.35-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192984",
                "lastFound": "1726570859902",
                "published": 1607521476000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-7wjx-3g7j-8584)",
                "qid": 988038,
                "cveids": [
                    "CVE-2021-22904"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.6",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860117",
                "lastFound": "1726570860117",
                "published": 1665668563000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for websocket-extensions (GHSA-g6wq-qcwm-j5g2)",
                "qid": 987991,
                "cveids": [
                    "CVE-2020-7663"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "websocket-extensions",
                        "version": "0.1.2",
                        "fixVersion": "0.1.5",
                        "packagePath": "usr/local/bundle/specifications/websocket-extensions-0.1.2.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859972",
                "lastFound": "1726570859972",
                "published": 1665668559000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for openssh (DLA 1500-1)",
                "qid": 177126,
                "cveids": [
                    "CVE-2015-5352",
                    "CVE-2015-5600",
                    "CVE-2015-6563",
                    "CVE-2015-6564",
                    "CVE-2016-1908",
                    "CVE-2016-3115",
                    "CVE-2016-6515",
                    "CVE-2016-10009",
                    "CVE-2016-10011",
                    "CVE-2016-10012",
                    "CVE-2016-10708",
                    "CVE-2017-15906"
                ],
                "cvssInfo": {
                    "baseScore": "8.5",
                    "temporalScore": "6.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "openssh-client",
                        "version": "1:6.7p1-5+deb8u3",
                        "fixVersion": "1:6.7p1-5+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192966",
                "lastFound": "1726570859883",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for i18n (GHSA-34hf-g744-jw64)",
                "qid": 988381,
                "cveids": [
                    "CVE-2014-10077"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "i18n",
                        "version": "0.7.0",
                        "fixVersion": "0.8.0",
                        "packagePath": "usr/local/bundle/specifications/i18n-0.7.0.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860386",
                "lastFound": "1726570860386",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for activejob (GHSA-q2qw-rmrh-vv42)",
                "qid": 989204,
                "cveids": [
                    "CVE-2018-16476"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "activejob",
                        "version": "5.0.1",
                        "fixVersion": "5.0.7.1",
                        "packagePath": "usr/local/bundle/specifications/activejob-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860570",
                "lastFound": "1726570860570",
                "published": 1668088074000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-mh37-8c3g-3fgc)",
                "qid": 988027,
                "cveids": [
                    "CVE-2019-8322"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rubygems-update",
                        "version": "2.6.8",
                        "fixVersion": "2.7.9",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860094",
                "lastFound": "1726570860094",
                "published": 1665668562000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 2049-1)",
                "qid": 177896,
                "cveids": [
                    "CVE-2019-19948",
                    "CVE-2019-19949"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u19"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192984",
                "lastFound": "1726570859902",
                "published": 1592829965000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for freetype (DLA 1887-1)",
                "qid": 177099,
                "cveids": [
                    "CVE-2015-9290"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libfreetype6:amd64",
                        "version": "2.5.2-3+deb8u1",
                        "fixVersion": "2.5.2-3+deb8u3"
                    },
                    {
                        "name": "libfreetype6-dev",
                        "version": "2.5.2-3+deb8u1",
                        "fixVersion": "2.5.2-3+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192964",
                "lastFound": "1726570859882",
                "published": 1567076424000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DLA 1917-1)",
                "qid": 177315,
                "cveids": [
                    "CVE-2019-5482"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u16"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u16"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u16"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u16"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192971",
                "lastFound": "1726570859888",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for libvpx (DSA 4132-1)",
                "qid": 176314,
                "cveids": [
                    "CVE-2017-13194"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "5.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libvpx1:amd64",
                        "version": "1.3.0-3",
                        "fixVersion": "1.3.0-3+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192940",
                "lastFound": "1726570859861",
                "published": 1520424687000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-pf6m-fxpq-fg8v)",
                "qid": 988662,
                "cveids": [
                    "CVE-2017-5029"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.7.2",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860504",
                "lastFound": "1726570860504",
                "published": 1667826874000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-2rr5-8q37-2w7h)",
                "qid": 988050,
                "cveids": [
                    "CVE-2021-41098"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.12.5",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860129",
                "lastFound": "1726570860129",
                "published": 1665668564000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for bzip2 (DLA 1833-1)",
                "qid": 177020,
                "cveids": [
                    "CVE-2016-3189",
                    "CVE-2019-12900"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libbz2-dev:amd64",
                        "version": "1.0.6-7+b3",
                        "fixVersion": "1.0.6-7+deb8u1"
                    },
                    {
                        "name": "libbz2-1.0:amd64",
                        "version": "1.0.6-7+b3",
                        "fixVersion": "1.0.6-7+deb8u1"
                    },
                    {
                        "name": "bzip2",
                        "version": "1.0.6-7+b3",
                        "fixVersion": "1.0.6-7+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192961",
                "lastFound": "1726570859879",
                "published": 1563274190000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for perl (DLA 1601-1)",
                "qid": 176849,
                "cveids": [
                    "CVE-2018-18311"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "perl",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u12"
                    },
                    {
                        "name": "perl-modules",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u12"
                    },
                    {
                        "name": "perl-base",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u12"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192957",
                "lastFound": "1726570859875",
                "published": 1554890302000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for sqlite3 (DLA 1633-1)",
                "qid": 176711,
                "cveids": [
                    "CVE-2017-2518",
                    "CVE-2017-2519",
                    "CVE-2017-2520",
                    "CVE-2017-10989",
                    "CVE-2018-8740"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libsqlite3-dev:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u4"
                    },
                    {
                        "name": "libsqlite3-0:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u4"
                    },
                    {
                        "name": "sqlite3",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192949",
                "lastFound": "1726570859868",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for activerecord (GHSA-8hc4-xxm3-5ppp)",
                "qid": 988337,
                "cveids": [
                    "CVE-2021-22880"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "activerecord",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.5",
                        "packagePath": "usr/local/bundle/specifications/activerecord-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860301",
                "lastFound": "1726570860301",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for glib2.0 (DLA 1826-1)",
                "qid": 177012,
                "cveids": [
                    "CVE-2019-12450"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libglib2.0-dev",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u1"
                    },
                    {
                        "name": "libglib2.0-data",
                        "version": "2.42.1-1",
                        "fixVersion": "2.42.1-1+deb8u1"
                    },
                    {
                        "name": "libglib2.0-bin",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u1"
                    },
                    {
                        "name": "libglib2.0-0:amd64",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192961",
                "lastFound": "1726570859879",
                "published": 1563274189000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxslt (DLA 1860-1)",
                "qid": 177060,
                "cveids": [
                    "CVE-2016-4609",
                    "CVE-2016-4610",
                    "CVE-2019-13117",
                    "CVE-2019-13118"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libxslt1-dev:amd64",
                        "version": "1.1.28-2+deb8u2",
                        "fixVersion": "1.1.28-2+deb8u5"
                    },
                    {
                        "name": "libxslt1.1:amd64",
                        "version": "1.1.28-2+deb8u2",
                        "fixVersion": "1.1.28-2+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192962",
                "lastFound": "1726570859880",
                "published": 1564398028000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DLA 1672-1)",
                "qid": 176667,
                "cveids": [
                    "CVE-2018-16890",
                    "CVE-2019-3822",
                    "CVE-2019-3823"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u14"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u14"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u14"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u14"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192947",
                "lastFound": "1726570859866",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for file (DLA 1969-1)",
                "qid": 177425,
                "cveids": [
                    "CVE-2019-18218"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libmagic1:amd64",
                        "version": "1:5.22+15-2+deb8u2",
                        "fixVersion": "1:5.22+15-2+deb8u6"
                    },
                    {
                        "name": "file",
                        "version": "1:5.22+15-2+deb8u2",
                        "fixVersion": "1:5.22+15-2+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192974",
                "lastFound": "1726570859892",
                "published": 1572345060000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for openssh (DLA 1500-2)",
                "qid": 177130,
                "cveids": [
                    "CVE-2016-1908"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "openssh-client",
                        "version": "1:6.7p1-5+deb8u3",
                        "fixVersion": "1:6.7p1-5+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192966",
                "lastFound": "1726570859884",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 1785-1)",
                "qid": 176900,
                "cveids": [
                    "CVE-2017-9500",
                    "CVE-2017-11446",
                    "CVE-2017-11523",
                    "CVE-2017-11537",
                    "CVE-2017-12140",
                    "CVE-2017-12430",
                    "CVE-2017-12432",
                    "CVE-2017-12435",
                    "CVE-2017-12563",
                    "CVE-2017-12587",
                    "CVE-2017-12643",
                    "CVE-2017-12670",
                    "CVE-2017-12674",
                    "CVE-2017-12691",
                    "CVE-2017-12692",
                    "CVE-2017-12693",
                    "CVE-2017-12875",
                    "CVE-2017-13133",
                    "CVE-2017-13142",
                    "CVE-2017-13145",
                    "CVE-2017-13658",
                    "CVE-2017-13768",
                    "CVE-2017-14060",
                    "CVE-2017-14172",
                    "CVE-2017-14173",
                    "CVE-2017-14174",
                    "CVE-2017-14175",
                    "CVE-2017-14249",
                    "CVE-2017-14341",
                    "CVE-2017-14400",
                    "CVE-2017-14505",
                    "CVE-2017-14532",
                    "CVE-2017-14624",
                    "CVE-2017-14625",
                    "CVE-2017-14626",
                    "CVE-2017-14739",
                    "CVE-2017-14741",
                    "CVE-2017-15015",
                    "CVE-2017-15017",
                    "CVE-2017-15281",
                    "CVE-2017-17682",
                    "CVE-2017-17914",
                    "CVE-2017-18271",
                    "CVE-2017-18273",
                    "CVE-2017-1000445",
                    "CVE-2017-1000476",
                    "CVE-2019-9956",
                    "CVE-2019-10650",
                    "CVE-2019-11597",
                    "CVE-2019-11598"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "6.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u16"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192959",
                "lastFound": "1726570859877",
                "published": 1558005825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-8c56-cpmw-89x7)",
                "qid": 988663,
                "cveids": [
                    "CVE-2017-9050"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.8.1",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860562",
                "lastFound": "1726570860562",
                "published": 1667826874000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for glib2.0 (DLA 1866-1)",
                "qid": 177079,
                "cveids": [
                    "CVE-2018-16428",
                    "CVE-2018-16429",
                    "CVE-2019-13012",
                    "CVE-2019-12450"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libglib2.0-dev",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u2"
                    },
                    {
                        "name": "libglib2.0-data",
                        "version": "2.42.1-1",
                        "fixVersion": "2.42.1-1+deb8u2"
                    },
                    {
                        "name": "libglib2.0-bin",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u2"
                    },
                    {
                        "name": "libglib2.0-0:amd64",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192963",
                "lastFound": "1726570859881",
                "published": 1566210022000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for activerecord (GHSA-3hhc-qp5v-9p2j)",
                "qid": 988314,
                "cveids": [
                    "CVE-2022-32224"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "activerecord",
                        "version": "5.0.1",
                        "fixVersion": "5.2.8.1",
                        "packagePath": "usr/local/bundle/specifications/activerecord-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860252",
                "lastFound": "1726570860252",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libidn (DLA 1447-1)",
                "qid": 177254,
                "cveids": [
                    "CVE-2017-14062"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libidn11:amd64",
                        "version": "1.29-1+deb8u2",
                        "fixVersion": "1.29-1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192969",
                "lastFound": "1726570859887",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DLA 1568-1)",
                "qid": 176814,
                "cveids": [
                    "CVE-2016-7141",
                    "CVE-2016-7167",
                    "CVE-2016-9586",
                    "CVE-2018-16839",
                    "CVE-2018-16842",
                    "CVE-2016-5420"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u13"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u13"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u13"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u13"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192955",
                "lastFound": "1726570859873",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-fq42-c5rg-92c2)",
                "qid": 988008,
                "cveids": [
                    "CVE-2021-30560",
                    "CVE-2022-23308"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.2",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860051",
                "lastFound": "1726570860051",
                "published": 1665668560000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libxslt (DLA 1756-1)",
                "qid": 176862,
                "cveids": [
                    "CVE-2019-11068"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libxslt1-dev:amd64",
                        "version": "1.1.28-2+deb8u2",
                        "fixVersion": "1.1.28-2+deb8u4"
                    },
                    {
                        "name": "libxslt1.1:amd64",
                        "version": "1.1.28-2+deb8u2",
                        "fixVersion": "1.1.28-2+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192957",
                "lastFound": "1726570859876",
                "published": 1556190374000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-cgx6-hpwq-fhv5)",
                "qid": 988037,
                "cveids": [
                    "CVE-2022-29824"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.5",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860114",
                "lastFound": "1726570860114",
                "published": 1665668563000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-wh98-p28r-vrc9)",
                "qid": 988036,
                "cveids": [
                    "CVE-2022-23633"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.6.2",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860111",
                "lastFound": "1726570860111",
                "published": 1665668563000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for loofah (GHSA-486f-hjj9-9vhh)",
                "qid": 990944,
                "cveids": [
                    "CVE-2022-23514"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.0",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "loofah",
                        "version": "2.0.3",
                        "fixVersion": "2.19.1",
                        "packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860583",
                "lastFound": "1726570860583",
                "published": 1672923995000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-76wm-422q-92mq)",
                "qid": 988339,
                "cveids": [
                    "CVE-2019-8324"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rubygems-update",
                        "version": "2.6.8",
                        "fixVersion": "2.7.9",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860314",
                "lastFound": "1726570860314",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libvpx (DLA 2136-1)",
                "qid": 177684,
                "cveids": [
                    "CVE-2020-0034"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "5.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libvpx1:amd64",
                        "version": "1.3.0-3",
                        "fixVersion": "1.3.0-3+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192979",
                "lastFound": "1726570859897",
                "published": 1584442208000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "highDataLoss": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rubygems-update (GHSA-3h4r-pjv6-cph9)",
                "qid": 988049,
                "cveids": [
                    "CVE-2019-8323"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "rubygems-update",
                        "version": "2.6.8",
                        "fixVersion": "2.7.9",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rubygems-update-2.6.8.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860126",
                "lastFound": "1726570860126",
                "published": 1665668564000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for zlib (DLA 2085-1)",
                "qid": 177622,
                "cveids": [
                    "CVE-2016-9840",
                    "CVE-2016-9841",
                    "CVE-2016-9842",
                    "CVE-2016-9843"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "zlib1g-dev:amd64",
                        "version": "1:1.2.8.dfsg-2+b1",
                        "fixVersion": "1:1.2.8.dfsg-2+deb8u1"
                    },
                    {
                        "name": "zlib1g:amd64",
                        "version": "1:1.2.8.dfsg-2+b1",
                        "fixVersion": "1:1.2.8.dfsg-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192979",
                "lastFound": "1726570859897",
                "published": 1580987657000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Ruby (rubygems) Security Update for tzinfo (GHSA-5cm2-9h8c-rvfx)",
                "qid": 987467,
                "cveids": [
                    "CVE-2022-31163"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.3",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.3"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "tzinfo",
                        "version": "1.2.2",
                        "fixVersion": "1.2.10",
                        "packagePath": "usr/local/bundle/specifications/tzinfo-1.2.2.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859910",
                "lastFound": "1726570859910",
                "published": 1663677763000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for sprockets (GHSA-pr3h-jjhj-573x)",
                "qid": 988563,
                "cveids": [
                    "CVE-2018-3760"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "sprockets",
                        "version": "3.7.1",
                        "fixVersion": "3.7.2",
                        "packagePath": "usr/local/bundle/specifications/sprockets-3.7.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860484",
                "lastFound": "1726570860484",
                "published": 1667826869000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgd2 (DLA 1651-1)",
                "qid": 176725,
                "cveids": [
                    "CVE-2018-5711",
                    "CVE-2018-1000222",
                    "CVE-2019-6977",
                    "CVE-2019-6978"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u12"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192951",
                "lastFound": "1726570859869",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-v6gp-9mmm-c6p5)",
                "qid": 988328,
                "cveids": [
                    "CVE-2018-25032"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 4,
                "customerSeverity": 4,
                "risk": 40,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.4",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860283",
                "lastFound": "1726570860283",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for patch (DLA 1856-1)",
                "qid": 177056,
                "cveids": [
                    "CVE-2019-13636"
                ],
                "cvssInfo": {
                    "baseScore": "5.8",
                    "temporalScore": "4.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "patch",
                        "version": "2.7.5-1",
                        "fixVersion": "2.7.5-1+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192962",
                "lastFound": "1726570859880",
                "published": 1564398028000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for openldap (DSA 3868-1)",
                "qid": 176046,
                "cveids": [
                    "CVE-2017-9287"
                ],
                "cvssInfo": {
                    "baseScore": "4.0",
                    "temporalScore": "3.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libldap-2.4-2:amd64",
                        "version": "2.4.40+dfsg-1+deb8u2",
                        "fixVersion": "2.4.40+dfsg-1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192925",
                "lastFound": "1726570859849",
                "published": 1496311197000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for python2.7 (DLA 1834-1)",
                "qid": 177021,
                "cveids": [
                    "CVE-2018-14647",
                    "CVE-2019-5010",
                    "CVE-2019-9636",
                    "CVE-2019-9740",
                    "CVE-2019-9947",
                    "CVE-2019-9948",
                    "CVE-2019-10160"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpython2.7-stdlib:amd64",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u3"
                    },
                    {
                        "name": "python2.7-minimal",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u3"
                    },
                    {
                        "name": "libpython2.7-minimal:amd64",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u3"
                    },
                    {
                        "name": "python2.7",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192961",
                "lastFound": "1726570859880",
                "published": 1563274190000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for jasper (DSA 3785-1)",
                "qid": 175961,
                "cveids": [
                    "CVE-2016-1867",
                    "CVE-2016-8654",
                    "CVE-2016-8691",
                    "CVE-2016-8692",
                    "CVE-2016-8693",
                    "CVE-2016-8882",
                    "CVE-2016-9560"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjasper-dev",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u2"
                    },
                    {
                        "name": "libjasper1:amd64",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192920",
                "lastFound": "1726570859845",
                "published": 1487580890000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "glibc ld.so Memory Leak and Buffer Overflow Vulnerabilities - Zero Day",
                "qid": 370680,
                "cveids": [
                    "CVE-2017-1000408",
                    "CVE-2017-1000409"
                ],
                "cvssInfo": {
                    "baseScore": "7.2",
                    "temporalScore": "6.8",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.6"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libc6-dev:amd64",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "libc-dev-bin",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "libc6:amd64",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "libc-bin",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "multiarch-support",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    }
                ],
                "category": "Local",
                "firstFound": "1726570859903",
                "lastFound": "1726570859903",
                "published": 1513046523000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "activeAttacks": true,
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "noPatch": true,
                    "publicExploit": true,
                    "zeroDay": true
                }
            },
            {
                "title": "Debian Security Update for openssl (DSA 3773-1)",
                "qid": 175949,
                "cveids": [
                    "CVE-2016-7056",
                    "CVE-2016-8610",
                    "CVE-2017-3731"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u6"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u6"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192919",
                "lastFound": "1726570859844",
                "published": 1485778379000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for pixman (DLA 1587-1)",
                "qid": 176829,
                "cveids": [
                    "CVE-2015-5297"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpixman-1-dev",
                        "version": "0.32.6-3",
                        "fixVersion": "0.32.6-3+deb8u1"
                    },
                    {
                        "name": "libpixman-1-0:amd64",
                        "version": "0.32.6-3",
                        "fixVersion": "0.32.6-3+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192955",
                "lastFound": "1726570859874",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for ca-certificates (DLA-1417-1)",
                "qid": 177181,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "ca-certificates",
                        "version": "20141019+deb8u1",
                        "fixVersion": "20141019+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192968",
                "lastFound": "1726570859885",
                "published": 1567076424000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for loofah (GHSA-x7rv-cr6v-4vm4)",
                "qid": 988647,
                "cveids": [
                    "CVE-2018-8048"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "loofah",
                        "version": "2.0.3",
                        "fixVersion": "2.2.1",
                        "packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860489",
                "lastFound": "1726570860489",
                "published": 1667826873000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libgd2 (DSA 3938-1)",
                "qid": 176113,
                "cveids": [
                    "CVE-2017-7890"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192931",
                "lastFound": "1726570859854",
                "published": 1502964196000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DLA 1642-1)",
                "qid": 176718,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.20-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.20-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.20-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192950",
                "lastFound": "1726570859869",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libjpeg-turbo (DLA 1638-1)",
                "qid": 176714,
                "cveids": [
                    "CVE-2016-3616",
                    "CVE-2018-1152",
                    "CVE-2018-11212",
                    "CVE-2018-11213",
                    "CVE-2018-11214"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjpeg62-turbo:amd64",
                        "version": "1:1.3.1-12",
                        "fixVersion": "1:1.3.1-12+deb8u1"
                    },
                    {
                        "name": "libjpeg-dev",
                        "version": "1:1.3.1-12",
                        "fixVersion": "1:1.3.1-12+deb8u1"
                    },
                    {
                        "name": "libjpeg62-turbo-dev:amd64",
                        "version": "1:1.3.1-12",
                        "fixVersion": "1:1.3.1-12+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192950",
                "lastFound": "1726570859868",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DSA 3834-1)",
                "qid": 176016,
                "cveids": [
                    "CVE-2017-3302",
                    "CVE-2017-3305",
                    "CVE-2017-3308",
                    "CVE-2017-3309",
                    "CVE-2017-3329",
                    "CVE-2017-3453",
                    "CVE-2017-3456",
                    "CVE-2017-3461",
                    "CVE-2017-3462",
                    "CVE-2017-3463",
                    "CVE-2017-3464",
                    "CVE-2017-3600"
                ],
                "cvssInfo": {
                    "baseScore": "6.3",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.7",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.55-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.55-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.55-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.55-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.55-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192922",
                "lastFound": "1726570859847",
                "published": 1493681039000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highDataLoss": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-882p-jqgm-f45g)",
                "qid": 988679,
                "cveids": [
                    "CVE-2017-18258"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.8.2",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860564",
                "lastFound": "1726570860564",
                "published": 1667826874000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for shadow (DSA 3793-1)",
                "qid": 175969,
                "cveids": [
                    "CVE-2016-6252",
                    "CVE-2017-2616"
                ],
                "cvssInfo": {
                    "baseScore": "4.7",
                    "temporalScore": "3.5",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "6.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "login",
                        "version": "1:4.2-3+deb8u1",
                        "fixVersion": "1:4.2-3+deb8u3"
                    },
                    {
                        "name": "passwd",
                        "version": "1:4.2-3+deb8u1",
                        "fixVersion": "1:4.2-3+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192921",
                "lastFound": "1726570859845",
                "published": 1488361496000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true
                }
            },
            {
                "title": "Debian Security Update for djvulibre (DLA 1985-1)",
                "qid": 177524,
                "cveids": [
                    "CVE-2019-18804"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libdjvulibre-dev:amd64",
                        "version": "3.5.25.4-4+b1",
                        "fixVersion": "3.5.25.4-4+deb8u2"
                    },
                    {
                        "name": "libdjvulibre-text",
                        "version": "3.5.25.4-4",
                        "fixVersion": "3.5.25.4-4+deb8u2"
                    },
                    {
                        "name": "libdjvulibre21:amd64",
                        "version": "3.5.25.4-4+b1",
                        "fixVersion": "3.5.25.4-4+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192975",
                "lastFound": "1726570859893",
                "published": 1577703921000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rake (GHSA-jppv-gw3r-w3q8)",
                "qid": 988399,
                "cveids": [
                    "CVE-2020-8130"
                ],
                "cvssInfo": {
                    "baseScore": "6.9",
                    "temporalScore": "5.4",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "6.4",
                    "temporalScore": "5.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rake",
                        "version": "10.4.2",
                        "fixVersion": "12.3.3",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/rake-10.4.2.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860459",
                "lastFound": "1726570860459",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for mercurial (DLA 1764-1)",
                "qid": 176921,
                "cveids": [
                    "CVE-2019-3902"
                ],
                "cvssInfo": {
                    "baseScore": "5.8",
                    "temporalScore": "4.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "mercurial-common",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u7"
                    },
                    {
                        "name": "mercurial",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192959",
                "lastFound": "1726570859878",
                "published": 1560767369000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for perl (DSA 4172-1)",
                "qid": 176355,
                "cveids": [
                    "CVE-2018-6797",
                    "CVE-2018-6798",
                    "CVE-2018-6913"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "perl",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u10"
                    },
                    {
                        "name": "perl-modules",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u10"
                    },
                    {
                        "name": "perl-base",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192942",
                "lastFound": "1726570859862",
                "published": 1524468872000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for openldap (DLA 1891-1)",
                "qid": 177291,
                "cveids": [
                    "CVE-2019-13057",
                    "CVE-2019-13565"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libldap-2.4-2:amd64",
                        "version": "2.4.40+dfsg-1+deb8u2",
                        "fixVersion": "2.4.40+dfsg-1+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192970",
                "lastFound": "1726570859888",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for mercurial (DSA 3963-1)",
                "qid": 176140,
                "cveids": [
                    "CVE-2017-9462",
                    "CVE-2017-1000115",
                    "CVE-2017-1000116"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "mercurial-common",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u4"
                    },
                    {
                        "name": "mercurial",
                        "version": "3.1.2-2+deb8u3",
                        "fixVersion": "3.1.2-2+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192932",
                "lastFound": "1726570859854",
                "published": 1505381043000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for icu (DSA 3830-1)",
                "qid": 176013,
                "cveids": [
                    "CVE-2017-7867",
                    "CVE-2017-7868"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libicu52:amd64",
                        "version": "52.1-8+deb8u4",
                        "fixVersion": "52.1-8+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192922",
                "lastFound": "1726570859847",
                "published": 1493030824000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionview (GHSA-xq5j-gw7f-jgj8)",
                "qid": 988064,
                "cveids": [
                    "CVE-2020-8167"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "actionview",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.3",
                        "packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860187",
                "lastFound": "1726570860187",
                "published": 1665668566000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DSA 3914-1)",
                "qid": 176093,
                "cveids": [
                    "CVE-2017-9439",
                    "CVE-2017-9440",
                    "CVE-2017-9500",
                    "CVE-2017-9501",
                    "CVE-2017-10928",
                    "CVE-2017-11141",
                    "CVE-2017-11170",
                    "CVE-2017-11360",
                    "CVE-2017-11188",
                    "CVE-2017-11447",
                    "CVE-2017-11448",
                    "CVE-2017-11449",
                    "CVE-2017-11450",
                    "CVE-2017-11478",
                    "CVE-2017-11505",
                    "CVE-2017-11524",
                    "CVE-2017-11525",
                    "CVE-2017-11526",
                    "CVE-2017-11527",
                    "CVE-2017-11528",
                    "CVE-2017-11529",
                    "CVE-2017-11530"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "6.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192929",
                "lastFound": "1726570859853",
                "published": 1501492610000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libevent (DSA 3789-1)",
                "qid": 175965,
                "cveids": [
                    "CVE-2016-10195",
                    "CVE-2016-10196",
                    "CVE-2016-10197"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "9.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libevent-2.0-5:amd64",
                        "version": "2.0.21-stable-2",
                        "fixVersion": "2.0.21-stable-2+deb8u1"
                    },
                    {
                        "name": "libevent-extra-2.0-5:amd64",
                        "version": "2.0.21-stable-2",
                        "fixVersion": "2.0.21-stable-2+deb8u1"
                    },
                    {
                        "name": "libevent-core-2.0-5:amd64",
                        "version": "2.0.21-stable-2",
                        "fixVersion": "2.0.21-stable-2+deb8u1"
                    },
                    {
                        "name": "libevent-dev",
                        "version": "2.0.21-stable-2",
                        "fixVersion": "2.0.21-stable-2+deb8u1"
                    },
                    {
                        "name": "libevent-pthreads-2.0-5:amd64",
                        "version": "2.0.21-stable-2",
                        "fixVersion": "2.0.21-stable-2+deb8u1"
                    },
                    {
                        "name": "libevent-openssl-2.0-5:amd64",
                        "version": "2.0.21-stable-2",
                        "fixVersion": "2.0.21-stable-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192920",
                "lastFound": "1726570859845",
                "published": 1487580890000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "exploitKit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DLA 2009-1)",
                "qid": 177506,
                "cveids": [
                    "CVE-2017-17095",
                    "CVE-2018-12900",
                    "CVE-2018-18661",
                    "CVE-2019-6128",
                    "CVE-2019-17546"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u10"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u10"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192975",
                "lastFound": "1726570859893",
                "published": 1577703921000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gnupg (DSA 4224-1)",
                "qid": 176407,
                "cveids": [
                    "CVE-2018-12020"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gpgv",
                        "version": "1.4.18-7+deb8u3",
                        "fixVersion": "1.4.18-7+deb8u5"
                    },
                    {
                        "name": "gnupg",
                        "version": "1.4.18-7+deb8u3",
                        "fixVersion": "1.4.18-7+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192945",
                "lastFound": "1726570859865",
                "published": 1528888111000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for sensible-utils (DSA 4071-1)",
                "qid": 176257,
                "cveids": [
                    "CVE-2017-17512"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "sensible-utils",
                        "version": "0.0.9",
                        "fixVersion": "0.0.9+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192938",
                "lastFound": "1726570859859",
                "published": 1516616911000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libffi (DSA 3889-1) (Stack Clash)",
                "qid": 176068,
                "cveids": [
                    "CVE-2017-1000376"
                ],
                "cvssInfo": {
                    "baseScore": "6.9",
                    "temporalScore": "5.1",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.0",
                    "temporalScore": "6.1"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libffi6:amd64",
                        "version": "3.1-2+b2",
                        "fixVersion": "3.1-2+deb8u1"
                    },
                    {
                        "name": "libffi-dev:amd64",
                        "version": "3.1-2+b2",
                        "fixVersion": "3.1-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192927",
                "lastFound": "1726570859851",
                "published": 1497920001000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for libtasn1-6 (DLA 2255-1)",
                "qid": 177913,
                "cveids": [
                    "CVE-2017-10790"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtasn1-6:amd64",
                        "version": "4.2-3+deb8u2",
                        "fixVersion": "4.2-3+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192985",
                "lastFound": "1726570859903",
                "published": 1594643880000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DSA 4051-1)",
                "qid": 176231,
                "cveids": [
                    "CVE-2017-8816",
                    "CVE-2017-8817"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u8"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u8"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u8"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192937",
                "lastFound": "1726570859858",
                "published": 1513153124000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DSA 4098-1)",
                "qid": 176277,
                "cveids": [
                    "CVE-2018-1000005",
                    "CVE-2018-1000007"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u9"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u9"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u9"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192939",
                "lastFound": "1726570859860",
                "published": 1517913327000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for sqlite3 (DLA 2203-1)",
                "qid": 177831,
                "cveids": [
                    "CVE-2020-11655"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libsqlite3-dev:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u5"
                    },
                    {
                        "name": "libsqlite3-0:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u5"
                    },
                    {
                        "name": "sqlite3",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192982",
                "lastFound": "1726570859901",
                "published": 1592829964000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DSA 4136-1)",
                "qid": 176318,
                "cveids": [
                    "CVE-2018-1000120",
                    "CVE-2018-1000121",
                    "CVE-2018-1000122"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u10"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u10"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u10"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192940",
                "lastFound": "1726570859862",
                "published": 1521541865000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for perl (DSA 3982-1)",
                "qid": 176161,
                "cveids": [
                    "CVE-2017-12837",
                    "CVE-2017-12883"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "perl",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u9"
                    },
                    {
                        "name": "perl-modules",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u9"
                    },
                    {
                        "name": "perl-base",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192934",
                "lastFound": "1726570859855",
                "published": 1506335286000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 1968-1)",
                "qid": 177421,
                "cveids": [
                    "CVE-2019-11470",
                    "CVE-2019-14981",
                    "CVE-2019-15139",
                    "CVE-2019-15140"
                ],
                "cvssInfo": {
                    "baseScore": "7.1",
                    "temporalScore": "5.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u18"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192974",
                "lastFound": "1726570859891",
                "published": 1572345060000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 1888-1)",
                "qid": 177288,
                "cveids": [
                    "CVE-2019-12974",
                    "CVE-2019-13135",
                    "CVE-2019-13295",
                    "CVE-2019-13297",
                    "CVE-2019-13304",
                    "CVE-2019-13305",
                    "CVE-2019-13306"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u17"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192970",
                "lastFound": "1726570859887",
                "published": 1569235399000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DLA 1566-1)",
                "qid": 176813,
                "cveids": [
                    "CVE-2018-2767",
                    "CVE-2018-3058",
                    "CVE-2018-3063",
                    "CVE-2018-3066",
                    "CVE-2018-3070",
                    "CVE-2018-3081",
                    "CVE-2018-3133",
                    "CVE-2018-3174",
                    "CVE-2018-3282"
                ],
                "cvssInfo": {
                    "baseScore": "4.9",
                    "temporalScore": "3.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.62-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.62-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.62-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.62-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.62-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192954",
                "lastFound": "1726570859873",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for procps (DSA 4208-1)",
                "qid": 176389,
                "cveids": [
                    "CVE-2018-1122",
                    "CVE-2018-1123",
                    "CVE-2018-1124",
                    "CVE-2018-1125",
                    "CVE-2018-1126"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "procps",
                        "version": "2:3.3.9-9",
                        "fixVersion": "2:3.3.9-9+deb8u1"
                    },
                    {
                        "name": "libprocps3:amd64",
                        "version": "2:3.3.9-9",
                        "fixVersion": "2:3.3.9-9+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192944",
                "lastFound": "1726570859864",
                "published": 1527154171000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgd2 (DSA 3777-1)",
                "qid": 175953,
                "cveids": [
                    "CVE-2016-6906",
                    "CVE-2016-6912",
                    "CVE-2016-9317",
                    "CVE-2016-10166",
                    "CVE-2016-10167",
                    "CVE-2016-10168"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192920",
                "lastFound": "1726570859845",
                "published": 1486381420000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DSA 4100-1)",
                "qid": 176278,
                "cveids": [
                    "CVE-2017-9935",
                    "CVE-2017-11335",
                    "CVE-2017-12944",
                    "CVE-2017-13726",
                    "CVE-2017-13727",
                    "CVE-2017-18013"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u5"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u5"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192939",
                "lastFound": "1726570859860",
                "published": 1517913327000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libssh2 (DLA 1991-1)",
                "qid": 177495,
                "cveids": [
                    "CVE-2019-17498"
                ],
                "cvssInfo": {
                    "baseScore": "5.8",
                    "temporalScore": "4.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssh2-1:amd64",
                        "version": "1.4.3-4.1+deb8u1",
                        "fixVersion": "1.4.3-4.1+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192975",
                "lastFound": "1726570859892",
                "published": 1577703921000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for shadow (DSA 3793-2)",
                "qid": 176034,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "0.0",
                    "temporalScore": "0.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "login",
                        "version": "1:4.2-3+deb8u1",
                        "fixVersion": "1:4.2-3+deb8u4"
                    },
                    {
                        "name": "passwd",
                        "version": "1:4.2-3+deb8u1",
                        "fixVersion": "1:4.2-3+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192924",
                "lastFound": "1726570859849",
                "published": 1495448011000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for curl (DLA 1804-1)",
                "qid": 176946,
                "cveids": [
                    "CVE-2019-5436"
                ],
                "cvssInfo": {
                    "baseScore": "4.6",
                    "temporalScore": "3.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u15"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u15"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u15"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u15"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192960",
                "lastFound": "1726570859879",
                "published": 1560767370000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for jquery (DLA 1777-1)",
                "qid": 176892,
                "cveids": [
                    "CVE-2019-11358"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjs-jquery",
                        "version": "1.7.2+dfsg-3.2",
                        "fixVersion": "1.7.2+dfsg-3.2+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192958",
                "lastFound": "1726570859877",
                "published": 1558005825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gdk-pixbuf (DSA 3978-1)",
                "qid": 176158,
                "cveids": [
                    "CVE-2017-2862"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gir1.2-gdkpixbuf-2.0",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u6"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-dev",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u6"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-0:amd64",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u6"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-common",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192933",
                "lastFound": "1726570859855",
                "published": 1506335286000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for icu (DLA 2151-1)",
                "qid": 177701,
                "cveids": [
                    "CVE-2020-10531"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libicu52:amd64",
                        "version": "52.1-8+deb8u4",
                        "fixVersion": "52.1-8+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192980",
                "lastFound": "1726570859898",
                "published": 1585568825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for imagemagick (DSA 4204-1)",
                "qid": 176386,
                "cveids": [
                    "CVE-2017-10995",
                    "CVE-2017-11533",
                    "CVE-2017-11535",
                    "CVE-2017-11639",
                    "CVE-2017-13143",
                    "CVE-2017-17504",
                    "CVE-2017-17879",
                    "CVE-2018-5248"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u12"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192944",
                "lastFound": "1726570859864",
                "published": 1527154171000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for jasper (DLA 1628-1)",
                "qid": 176706,
                "cveids": [
                    "CVE-2018-18873",
                    "CVE-2018-19139",
                    "CVE-2018-19539",
                    "CVE-2018-19540",
                    "CVE-2018-19541",
                    "CVE-2018-19542",
                    "CVE-2018-20570",
                    "CVE-2018-20584",
                    "CVE-2018-20622"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjasper-dev",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u5"
                    },
                    {
                        "name": "libjasper1:amd64",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192949",
                "lastFound": "1726570859867",
                "published": 1553602672000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libssh2 (DLA 1730-2)",
                "qid": 176775,
                "cveids": [
                    "CVE-2019-3859"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssh2-1:amd64",
                        "version": "1.4.3-4.1+deb8u1",
                        "fixVersion": "1.4.3-4.1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192953",
                "lastFound": "1726570859872",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DSA 3799-1)",
                "qid": 175977,
                "cveids": [
                    "CVE-2016-8707",
                    "CVE-2016-10062",
                    "CVE-2016-10144",
                    "CVE-2016-10145",
                    "CVE-2016-10146",
                    "CVE-2017-5506",
                    "CVE-2017-5507",
                    "CVE-2017-5508",
                    "CVE-2017-5510",
                    "CVE-2017-5511"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "6.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192921",
                "lastFound": "1726570859846",
                "published": 1488879780000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gdk-pixbuf (DSA 4088-1)",
                "qid": 176270,
                "cveids": [
                    "CVE-2017-1000422",
                    "CVE-2017-6312",
                    "CVE-2017-6313",
                    "CVE-2017-6314"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gir1.2-gdkpixbuf-2.0",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u7"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-dev",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u7"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-0:amd64",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u7"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-common",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192939",
                "lastFound": "1726570859859",
                "published": 1516270152000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for jasper (DLA 1628-2)",
                "qid": 176868,
                "cveids": [
                    "CVE-2018-19542"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjasper-dev",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u6"
                    },
                    {
                        "name": "libjasper1:amd64",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192958",
                "lastFound": "1726570859877",
                "published": 1556535783000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for file (DLA 1698-1)",
                "qid": 176692,
                "cveids": [
                    "CVE-2019-8905",
                    "CVE-2019-8907"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagic1:amd64",
                        "version": "1:5.22+15-2+deb8u2",
                        "fixVersion": "1:5.22+15-2+deb8u5"
                    },
                    {
                        "name": "file",
                        "version": "1:5.22+15-2+deb8u2",
                        "fixVersion": "1:5.22+15-2+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192948",
                "lastFound": "1726570859867",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for bzr (DSA 4052-1)",
                "qid": 176232,
                "cveids": [
                    "CVE-2017-14176"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "6.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "bzr",
                        "version": "2.6.0+bzr6595-6",
                        "fixVersion": "2.6.0+bzr6595-6+deb8u1"
                    },
                    {
                        "name": "python-bzrlib",
                        "version": "2.6.0+bzr6595-6",
                        "fixVersion": "2.6.0+bzr6595-6+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192937",
                "lastFound": "1726570859858",
                "published": 1513153124000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Rubygems (rubygems) Security Update for actionview (GHSA-ch3h-j2vf-95pv)",
                "qid": 987667,
                "cveids": [
                    "CVE-2022-27777"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "actionview",
                        "version": "5.0.1",
                        "fixVersion": "5.2.7.1",
                        "packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859970",
                "lastFound": "1726570859970",
                "published": 1663852806000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tzdata (DLA 1744-1)",
                "qid": 176771,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "tzdata",
                        "version": "2016j-0+deb8u1",
                        "fixVersion": "2019a-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192952",
                "lastFound": "1726570859871",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 1394-1)",
                "qid": 177204,
                "cveids": [
                    "CVE-2018-11251",
                    "CVE-2018-12599",
                    "CVE-2018-12600"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u13"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192968",
                "lastFound": "1726570859886",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionview (GHSA-65cv-r6x7-79hv)",
                "qid": 988320,
                "cveids": [
                    "CVE-2020-5267"
                ],
                "cvssInfo": {
                    "baseScore": "3.5",
                    "temporalScore": "2.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "4.8",
                    "temporalScore": "4.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "actionview",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.2",
                        "packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860272",
                "lastFound": "1726570860272",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gdk-pixbuf (DLA 2043-1)",
                "qid": 177554,
                "cveids": [
                    "CVE-2016-6352",
                    "CVE-2017-2870",
                    "CVE-2017-6312",
                    "CVE-2017-6313",
                    "CVE-2017-6314"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gir1.2-gdkpixbuf-2.0",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-dev",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-0:amd64",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-common",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192976",
                "lastFound": "1726570859894",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DLA-1874-1)",
                "qid": 177087,
                "cveids": [
                    "CVE-2019-10208",
                    "CVE-2007-2138"
                ],
                "cvssInfo": {
                    "baseScore": "6.5",
                    "temporalScore": "4.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.24-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.24-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.24-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192964",
                "lastFound": "1726570859882",
                "published": 1566210022000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DLA 1784-1)",
                "qid": 176898,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.22-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.22-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.22-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192958",
                "lastFound": "1726570859877",
                "published": 1558005825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for tzdata (DLA 1625-1)",
                "qid": 176704,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "tzdata",
                        "version": "2016j-0+deb8u1",
                        "fixVersion": "2018i-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192948",
                "lastFound": "1726570859867",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for tzdata (DLA 1957-1)",
                "qid": 177412,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "tzdata",
                        "version": "2016j-0+deb8u1",
                        "fixVersion": "2019c-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192974",
                "lastFound": "1726570859891",
                "published": 1572345060000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for jquery (DLA 1777-2)",
                "qid": 176930,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjs-jquery",
                        "version": "1.7.2+dfsg-3.2",
                        "fixVersion": "1.7.2+dfsg-3.2+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192960",
                "lastFound": "1726570859878",
                "published": 1560767369000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libgd2 (DSA 3961-1)",
                "qid": 176149,
                "cveids": [
                    "CVE-2017-6362"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u11"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192933",
                "lastFound": "1726570859855",
                "published": 1505381043000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for graphite2 (DSA 3894-1)",
                "qid": 176073,
                "cveids": [
                    "CVE-2017-7771",
                    "CVE-2017-7772",
                    "CVE-2017-7773",
                    "CVE-2017-7774",
                    "CVE-2017-7776",
                    "CVE-2017-7777",
                    "CVE-2017-7778"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgraphite2-3:amd64",
                        "version": "1.3.6-1~deb8u1",
                        "fixVersion": "1.3.10-1~deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192928",
                "lastFound": "1726570859851",
                "published": 1499075273000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for krb5 (DLA 1643-1)",
                "qid": 176719,
                "cveids": [
                    "CVE-2018-5729",
                    "CVE-2018-5730",
                    "CVE-2018-20217",
                    "CVE-2018-5710"
                ],
                "cvssInfo": {
                    "baseScore": "6.5",
                    "temporalScore": "4.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgssapi-krb5-2:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libkrb5-3:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "krb5-multidev",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libkadm5srv-mit9:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libkrb5support0:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libgssrpc4:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libkdb5-7:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libk5crypto3:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libkadm5clnt-mit9:amd64",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    },
                    {
                        "name": "libkrb5-dev",
                        "version": "1.12.1+dfsg-19+deb8u2",
                        "fixVersion": "1.12.1+dfsg-19+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192951",
                "lastFound": "1726570859869",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for patch (DLA 1864-1)",
                "qid": 177065,
                "cveids": [
                    "CVE-2019-13638",
                    "CVE-2018-20969"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "7.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "patch",
                        "version": "2.7.5-1",
                        "fixVersion": "2.7.5-1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192963",
                "lastFound": "1726570859881",
                "published": 1564398029000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DLA 2105-1)",
                "qid": 177663,
                "cveids": [
                    "CVE-2020-1720"
                ],
                "cvssInfo": {
                    "baseScore": "3.5",
                    "temporalScore": "2.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.26-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.26-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.26-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192980",
                "lastFound": "1726570859898",
                "published": 1585568825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1701-1)",
                "qid": 176633,
                "cveids": [
                    "CVE-2019-1559"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u11"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u11"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u11"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192946",
                "lastFound": "1726570859865",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-hrqr-hxpp-chr3)",
                "qid": 987996,
                "cveids": [
                    "CVE-2019-16782"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.8",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860212",
                "lastFound": "1726570860212",
                "published": 1665668559000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DSA 3851-1)",
                "qid": 176030,
                "cveids": [
                    "CVE-2017-7484",
                    "CVE-2017-7485",
                    "CVE-2017-7486"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.12-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.12-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.12-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192924",
                "lastFound": "1726570859848",
                "published": 1495448011000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for freetype (DLA 1909-1)",
                "qid": 177308,
                "cveids": [
                    "CVE-2015-9381",
                    "CVE-2015-9382",
                    "CVE-2015-9383"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libfreetype6:amd64",
                        "version": "2.5.2-3+deb8u1",
                        "fixVersion": "2.5.2-3+deb8u4"
                    },
                    {
                        "name": "libfreetype6-dev",
                        "version": "2.5.2-3+deb8u1",
                        "fixVersion": "2.5.2-3+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192971",
                "lastFound": "1726570859888",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DSA 3903-1)",
                "qid": 176081,
                "cveids": [
                    "CVE-2016-10095",
                    "CVE-2017-9147",
                    "CVE-2017-9403",
                    "CVE-2017-9404",
                    "CVE-2017-9936",
                    "CVE-2017-10688"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u4"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u4"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192929",
                "lastFound": "1726570859852",
                "published": 1499682317000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgd2 (DLA 1817-1)",
                "qid": 176988,
                "cveids": [
                    "CVE-2019-11038"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.3",
                    "temporalScore": "4.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u13"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192960",
                "lastFound": "1726570859879",
                "published": 1560943023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for git (DSA 3984-1)",
                "qid": 176164,
                "cveids": [
                    "CVE-2017-14867"
                ],
                "cvssInfo": {
                    "baseScore": "9.0",
                    "temporalScore": "6.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u5"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192934",
                "lastFound": "1726570859855",
                "published": 1507021692000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for cyrus-sasl2 (DLA 2044-1)",
                "qid": 177564,
                "cveids": [
                    "CVE-2019-19906"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libsasl2-modules-db:amd64",
                        "version": "2.1.26.dfsg1-13+deb8u1",
                        "fixVersion": "2.1.26.dfsg1-13+deb8u2"
                    },
                    {
                        "name": "libsasl2-2:amd64",
                        "version": "2.1.26.dfsg1-13+deb8u1",
                        "fixVersion": "2.1.26.dfsg1-13+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192977",
                "lastFound": "1726570859895",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DSA 3762-1)",
                "qid": 175938,
                "cveids": [
                    "CVE-2016-3622",
                    "CVE-2016-3623",
                    "CVE-2016-3624",
                    "CVE-2016-3945",
                    "CVE-2016-3990",
                    "CVE-2016-3991",
                    "CVE-2016-5314",
                    "CVE-2016-5315",
                    "CVE-2016-5316",
                    "CVE-2016-5317",
                    "CVE-2016-5321",
                    "CVE-2016-5322",
                    "CVE-2016-5323",
                    "CVE-2016-5652",
                    "CVE-2016-6223",
                    "CVE-2016-9273",
                    "CVE-2016-9297",
                    "CVE-2016-9448",
                    "CVE-2016-9453",
                    "CVE-2016-9532",
                    "CVE-2016-9533",
                    "CVE-2016-9534",
                    "CVE-2016-9535",
                    "CVE-2016-9536",
                    "CVE-2016-9537",
                    "CVE-2016-9538",
                    "CVE-2016-9540",
                    "CVE-2016-10092",
                    "CVE-2016-10093",
                    "CVE-2016-10094",
                    "CVE-2016-10271",
                    "CVE-2016-10272"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u2"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u2"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192918",
                "lastFound": "1726570859843",
                "published": 1484559036000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for apt (DLA 2210-1)",
                "qid": 177832,
                "cveids": [
                    "CVE-2020-3810"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "apt",
                        "version": "1.0.9.8.4",
                        "fixVersion": "1.0.9.8.6"
                    },
                    {
                        "name": "libapt-pkg4.12:amd64",
                        "version": "1.0.9.8.4",
                        "fixVersion": "1.0.9.8.6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192983",
                "lastFound": "1726570859901",
                "published": 1595494992000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgcrypt20 (DLA 1931-2)",
                "qid": 177571,
                "cveids": [
                    "CVE-2019-13627"
                ],
                "cvssInfo": {
                    "baseScore": "2.6",
                    "temporalScore": "1.9",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "6.3",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgcrypt20:amd64",
                        "version": "1.6.3-2+deb8u2",
                        "fixVersion": "1.6.3-2+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192978",
                "lastFound": "1726570859896",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DSA 3767-1)",
                "qid": 175946,
                "cveids": [
                    "CVE-2017-3238",
                    "CVE-2017-3243",
                    "CVE-2017-3244",
                    "CVE-2017-3258",
                    "CVE-2017-3265",
                    "CVE-2017-3291",
                    "CVE-2017-3312",
                    "CVE-2017-3313",
                    "CVE-2017-3317",
                    "CVE-2017-3318"
                ],
                "cvssInfo": {
                    "baseScore": "4.9",
                    "temporalScore": "3.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.7",
                    "temporalScore": "5.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.54-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.54-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.54-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.54-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.54-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192918",
                "lastFound": "1726570859843",
                "published": 1485337367000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for systemd (DLA 1762-1)",
                "qid": 176866,
                "cveids": [
                    "CVE-2017-18078",
                    "CVE-2019-3842"
                ],
                "cvssInfo": {
                    "baseScore": "4.6",
                    "temporalScore": "3.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "udev",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u12"
                    },
                    {
                        "name": "libsystemd0:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u12"
                    },
                    {
                        "name": "systemd-sysv",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u12"
                    },
                    {
                        "name": "libudev1:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u12"
                    },
                    {
                        "name": "systemd",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u12"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192957",
                "lastFound": "1726570859876",
                "published": 1556190374000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gcc-4.9 (DLA 1606-1)",
                "qid": 176781,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libstdc++6:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libasan1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libstdc++-4.9-dev:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libgomp1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libubsan0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "gcc-4.9",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libgcc-4.9-dev:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libtsan0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "g++-4.9",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libatomic1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libcilkrts5:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "cpp-4.9",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "gcc-4.9-base:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "liblsan0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libquadmath0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    },
                    {
                        "name": "libitm1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192953",
                "lastFound": "1726570859872",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DSA 4027-1)",
                "qid": 176207,
                "cveids": [
                    "CVE-2017-15098"
                ],
                "cvssInfo": {
                    "baseScore": "5.5",
                    "temporalScore": "4.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.1"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.15-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.15-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.15-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192936",
                "lastFound": "1726570859857",
                "published": 1510565039000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-5r2p-j47h-mhpg)",
                "qid": 989142,
                "cveids": [
                    "CVE-2018-16471"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.6",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860568",
                "lastFound": "1726570860568",
                "published": 1668088071000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for rtmpdump (DSA 3850-1)",
                "qid": 176029,
                "cveids": [
                    "CVE-2015-8270",
                    "CVE-2015-8271",
                    "CVE-2015-8272"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "librtmp1:amd64",
                        "version": "2.4+20150115.gita107cef-1",
                        "fixVersion": "2.4+20150115.gita107cef-1+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192923",
                "lastFound": "1726570859848",
                "published": 1495448011000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-mcvf-2q2m-x72m)",
                "qid": 991021,
                "cveids": [
                    "CVE-2022-23518"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.3",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rails-html-sanitizer",
                        "version": "1.0.3",
                        "fixVersion": "1.4.4",
                        "packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860606",
                "lastFound": "1726570860606",
                "published": 1672837005000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DSA 4176-1)",
                "qid": 176359,
                "cveids": [
                    "CVE-2018-2755",
                    "CVE-2018-2761",
                    "CVE-2018-2771",
                    "CVE-2018-2773",
                    "CVE-2018-2781",
                    "CVE-2018-2813",
                    "CVE-2018-2817",
                    "CVE-2018-2818",
                    "CVE-2018-2819"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.7",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.60-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.60-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.60-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.60-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.60-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192943",
                "lastFound": "1726570859863",
                "published": 1524468872000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for perl (DSA 4226-1)",
                "qid": 176409,
                "cveids": [
                    "CVE-2018-12015"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "perl",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u11"
                    },
                    {
                        "name": "perl-modules",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u11"
                    },
                    {
                        "name": "perl-base",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u11"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192945",
                "lastFound": "1726570859865",
                "published": 1529482921000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Ruby (rubygems) Security Update for nokogiri (GHSA-vr8q-g5c7-m54m)",
                "qid": 987468,
                "cveids": [
                    "CVE-2020-26247"
                ],
                "cvssInfo": {
                    "baseScore": "4.0",
                    "temporalScore": "3.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "4.3",
                    "temporalScore": "3.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.11.0",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859949",
                "lastFound": "1726570859949",
                "published": 1663677763000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for jasper (DSA 3827-1)",
                "qid": 176009,
                "cveids": [
                    "CVE-2016-9591",
                    "CVE-2016-10249",
                    "CVE-2016-10251"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjasper-dev",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u3"
                    },
                    {
                        "name": "libjasper1:amd64",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192922",
                "lastFound": "1726570859846",
                "published": 1491992844000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxml2 (DSA 4086-1)",
                "qid": 176266,
                "cveids": [
                    "CVE-2017-15412"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxml2:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u6"
                    },
                    {
                        "name": "libxml2-dev:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192938",
                "lastFound": "1726570859859",
                "published": 1516270152000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for systemd (DLA 1711-1)",
                "qid": 176641,
                "cveids": [
                    "CVE-2019-3815",
                    "CVE-2018-16864"
                ],
                "cvssInfo": {
                    "baseScore": "4.6",
                    "temporalScore": "3.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "udev",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u11"
                    },
                    {
                        "name": "libsystemd0:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u11"
                    },
                    {
                        "name": "systemd-sysv",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u11"
                    },
                    {
                        "name": "libudev1:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u11"
                    },
                    {
                        "name": "systemd",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u11"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192946",
                "lastFound": "1726570859866",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for bash (DLA 1726-1)",
                "qid": 176754,
                "cveids": [
                    "CVE-2016-9401",
                    "CVE-2019-9924"
                ],
                "cvssInfo": {
                    "baseScore": "7.2",
                    "temporalScore": "5.3",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "6.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "bash",
                        "version": "4.3-11+b1",
                        "fixVersion": "4.3-11+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192951",
                "lastFound": "1726570859870",
                "published": 1554375137000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for wget (DLA 2086-1)",
                "qid": 177623,
                "cveids": [
                    "CVE-2016-7098"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "wget",
                        "version": "1.16-1+deb8u1",
                        "fixVersion": "1.16-1+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192979",
                "lastFound": "1726570859897",
                "published": 1580987657000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gdk-pixbuf (DLA 2043-2)",
                "qid": 177563,
                "cveids": [
                    "CVE-2017-6314"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gir1.2-gdkpixbuf-2.0",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u9"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-dev",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u9"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-0:amd64",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u9"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-common",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192977",
                "lastFound": "1726570859895",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for git (DSA 3848-1)",
                "qid": 176027,
                "cveids": [
                    "CVE-2017-8386"
                ],
                "cvssInfo": {
                    "baseScore": "6.5",
                    "temporalScore": "5.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u3"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192923",
                "lastFound": "1726570859848",
                "published": 1494498198000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for git (DLA 2177-1)",
                "qid": 177755,
                "cveids": [
                    "CVE-2020-5260"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u9"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192981",
                "lastFound": "1726570859899",
                "published": 1588680879000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgd2 (DSA 3751-1)",
                "qid": 175927,
                "cveids": [
                    "CVE-2016-9933"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192918",
                "lastFound": "1726570859842",
                "published": 1483955004000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for jasper (DLA 1583-1)",
                "qid": 176838,
                "cveids": [
                    "CVE-2015-5203",
                    "CVE-2015-5221",
                    "CVE-2016-8690",
                    "CVE-2017-13748",
                    "CVE-2017-14132",
                    "CVE-2016-8884",
                    "CVE-2016-8885"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjasper-dev",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u4"
                    },
                    {
                        "name": "libjasper1:amd64",
                        "version": "1.900.1-debian1-2.4+deb8u1",
                        "fixVersion": "1.900.1-debian1-2.4+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192956",
                "lastFound": "1726570859875",
                "published": 1554977888000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DLA 1557-1)",
                "qid": 177114,
                "cveids": [
                    "CVE-2018-17100",
                    "CVE-2018-17101",
                    "CVE-2018-18557"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u7"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u7"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192965",
                "lastFound": "1726570859883",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for python2.7 (DLA 1925-1)",
                "qid": 177320,
                "cveids": [
                    "CVE-2019-16056"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpython2.7-stdlib:amd64",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u5"
                    },
                    {
                        "name": "python2.7-minimal",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u5"
                    },
                    {
                        "name": "libpython2.7-minimal:amd64",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u5"
                    },
                    {
                        "name": "python2.7",
                        "version": "2.7.9-2+deb8u1",
                        "fixVersion": "2.7.9-2+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192971",
                "lastFound": "1726570859889",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgd2 (DLA 2106-1)",
                "qid": 177714,
                "cveids": [
                    "CVE-2018-14553"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgd3:amd64",
                        "version": "2.1.0-5+deb8u7",
                        "fixVersion": "2.1.0-5+deb8u14"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192980",
                "lastFound": "1726570859898",
                "published": 1585568826000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for imagemagick (DSA 3808-1)",
                "qid": 175988,
                "cveids": [
                    "CVE-2017-6498",
                    "CVE-2017-6499",
                    "CVE-2017-6500",
                    "CVE-2016-10252"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "5.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192921",
                "lastFound": "1726570859846",
                "published": 1490007711000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for git (DSA 3934-1)",
                "qid": 176109,
                "cveids": [
                    "CVE-2017-1000117"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u4"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192930",
                "lastFound": "1726570859853",
                "published": 1502964196000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for bundler (GHSA-fj7f-vq84-fh43)",
                "qid": 988317,
                "cveids": [
                    "CVE-2021-43809"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "7.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.3",
                    "temporalScore": "6.6"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "bundler",
                        "version": "1.13.7",
                        "fixVersion": "2.2.33",
                        "packagePath": "usr/local/lib/ruby/gems/2.3.0/specifications/bundler-1.13.7.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860265",
                "lastFound": "1726570860265",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for systemd (DLA 1762-2)",
                "qid": 176923,
                "cveids": [
                    "CVE-2017-18078"
                ],
                "cvssInfo": {
                    "baseScore": "4.6",
                    "temporalScore": "3.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "udev",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u13"
                    },
                    {
                        "name": "libsystemd0:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u13"
                    },
                    {
                        "name": "systemd-sysv",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u13"
                    },
                    {
                        "name": "libudev1:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u13"
                    },
                    {
                        "name": "systemd",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u13"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192959",
                "lastFound": "1726570859878",
                "published": 1560767369000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for glib2.0 (DLA 1866-2)",
                "qid": 177085,
                "cveids": [
                    "CVE-2019-13012"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libglib2.0-dev",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u3"
                    },
                    {
                        "name": "libglib2.0-data",
                        "version": "2.42.1-1",
                        "fixVersion": "2.42.1-1+deb8u3"
                    },
                    {
                        "name": "libglib2.0-bin",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u3"
                    },
                    {
                        "name": "libglib2.0-0:amd64",
                        "version": "2.42.1-1+b1",
                        "fixVersion": "2.42.1-1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192964",
                "lastFound": "1726570859882",
                "published": 1566210022000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for gnutls28 (DLA 1560-1)",
                "qid": 177117,
                "cveids": [
                    "CVE-2018-10844",
                    "CVE-2018-10845",
                    "CVE-2018-10846"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgnutls-deb0-28:amd64",
                        "version": "3.3.8-6+deb8u3",
                        "fixVersion": "3.3.30-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192965",
                "lastFound": "1726570859883",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DSA 4157-1)",
                "qid": 176339,
                "cveids": [
                    "CVE-2017-3738",
                    "CVE-2018-0739"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u8"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u8"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192942",
                "lastFound": "1726570859862",
                "published": 1522655886000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for openldap (DLA 2199-1)",
                "qid": 177829,
                "cveids": [
                    "CVE-2020-12243"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libldap-2.4-2:amd64",
                        "version": "2.4.40+dfsg-1+deb8u2",
                        "fixVersion": "2.4.40+dfsg-1+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192982",
                "lastFound": "1726570859900",
                "published": 1592829964000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libssh2 (DLA 1730-4)",
                "qid": 177078,
                "cveids": [
                    "CVE-2019-3860"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssh2-1:amd64",
                        "version": "1.4.3-4.1+deb8u1",
                        "fixVersion": "1.4.3-4.1+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192963",
                "lastFound": "1726570859881",
                "published": 1567076424000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DSA 3935-1)",
                "qid": 176110,
                "cveids": [
                    "CVE-2017-7546",
                    "CVE-2017-7547",
                    "CVE-2017-7548"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.13-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.13-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.13-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192930",
                "lastFound": "1726570859853",
                "published": 1502964196000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DSA 4002-1)",
                "qid": 176181,
                "cveids": [
                    "CVE-2017-10268",
                    "CVE-2017-10378",
                    "CVE-2017-10379",
                    "CVE-2017-10384"
                ],
                "cvssInfo": {
                    "baseScore": "4.0",
                    "temporalScore": "3.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.58-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.58-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.58-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.58-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.58-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192935",
                "lastFound": "1726570859856",
                "published": 1510565038000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1932-1)",
                "qid": 177351,
                "cveids": [
                    "CVE-2019-1547",
                    "CVE-2019-1563"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "4.7",
                    "temporalScore": "4.1"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u12"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u12"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u12"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192973",
                "lastFound": "1726570859890",
                "published": 1570056498000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for curl (DSA 3992-1)",
                "qid": 176172,
                "cveids": [
                    "CVE-2017-1000100",
                    "CVE-2017-1000101",
                    "CVE-2017-1000254"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u6"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u6"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u6"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192934",
                "lastFound": "1726570859856",
                "published": 1508229407000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for wget (DSA 4008-1)",
                "qid": 176187,
                "cveids": [
                    "CVE-2017-13089",
                    "CVE-2017-13090"
                ],
                "cvssInfo": {
                    "baseScore": "9.3",
                    "temporalScore": "7.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "wget",
                        "version": "1.16-1+deb8u1",
                        "fixVersion": "1.16-1+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192935",
                "lastFound": "1726570859857",
                "published": 1510565038000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for expat (DSA 3898-1)",
                "qid": 176077,
                "cveids": [
                    "CVE-2016-9063",
                    "CVE-2017-9233"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libexpat1-dev:amd64",
                        "version": "2.1.0-6+deb8u3",
                        "fixVersion": "2.1.0-6+deb8u4"
                    },
                    {
                        "name": "libexpat1:amd64",
                        "version": "2.1.0-6+deb8u3",
                        "fixVersion": "2.1.0-6+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192928",
                "lastFound": "1726570859852",
                "published": 1499333160000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for lcms2 (DLA 1496-1)",
                "qid": 177225,
                "cveids": [
                    "CVE-2018-16435"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "liblcms2-2:amd64",
                        "version": "2.6-3+b3",
                        "fixVersion": "2.6-3+deb8u2"
                    },
                    {
                        "name": "liblcms2-dev:amd64",
                        "version": "2.6-3+b3",
                        "fixVersion": "2.6-3+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192969",
                "lastFound": "1726570859886",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libtasn1-6 (DSA 3861-1)",
                "qid": 176041,
                "cveids": [
                    "CVE-2017-6891"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtasn1-6:amd64",
                        "version": "4.2-3+deb8u2",
                        "fixVersion": "4.2-3+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192925",
                "lastFound": "1726570859849",
                "published": 1496039362000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libxpm (DSA 3772-1)",
                "qid": 175947,
                "cveids": [
                    "CVE-2016-10164"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxpm4:amd64",
                        "version": "1:3.5.11-1+b1",
                        "fixVersion": "1:3.5.12-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192919",
                "lastFound": "1726570859844",
                "published": 1485778378000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Ruby (rubygems) Security Update for rails-html-sanitizer (GHSA-pg8v-g4xq-hww9)",
                "qid": 987474,
                "cveids": [
                    "CVE-2022-32209"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rails-html-sanitizer",
                        "version": "1.0.3",
                        "fixVersion": "1.4.3",
                        "packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859964",
                "lastFound": "1726570859964",
                "published": 1663677763000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for harfbuzz (DLA 2040-1)",
                "qid": 177551,
                "cveids": [
                    "CVE-2015-8947"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.6",
                    "temporalScore": "6.6"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libharfbuzz0b:amd64",
                        "version": "0.9.35-2",
                        "fixVersion": "0.9.35-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192976",
                "lastFound": "1726570859894",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-2qc6-mcvw-92cw)",
                "qid": 988554,
                "cveids": [
                    "CVE-2022-2309",
                    "CVE-2022-40303",
                    "CVE-2022-40304"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.9",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860476",
                "lastFound": "1726570860476",
                "published": 1667826869000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxml2 (DSA 3744-1)",
                "qid": 175920,
                "cveids": [
                    "CVE-2016-4658",
                    "CVE-2016-5131"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxml2:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u4"
                    },
                    {
                        "name": "libxml2-dev:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192917",
                "lastFound": "1726570859841",
                "published": 1482997806000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for libexif (DLA 2214-1)",
                "qid": 177820,
                "cveids": [
                    "CVE-2016-6328",
                    "CVE-2017-7544",
                    "CVE-2018-20030",
                    "CVE-2020-0093",
                    "CVE-2020-12767"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "6.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "8.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libexif-dev",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u2"
                    },
                    {
                        "name": "libexif12:amd64",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192981",
                "lastFound": "1726570859900",
                "published": 1592829964000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for wget (DLA 1760-1)",
                "qid": 176864,
                "cveids": [
                    "CVE-2019-5953"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.5",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "wget",
                        "version": "1.16-1+deb8u1",
                        "fixVersion": "1.16-1+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192957",
                "lastFound": "1726570859876",
                "published": 1556190374000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for openssh (DLA-1474-1)",
                "qid": 177165,
                "cveids": [
                    "CVE-2018-15473"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "4.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.3",
                    "temporalScore": "4.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "openssh-client",
                        "version": "1:6.7p1-5+deb8u3",
                        "fixVersion": "1:6.7p1-5+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192967",
                "lastFound": "1726570859884",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "activeAttacks": true,
                    "easyExploit": true,
                    "malware": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1586-1)",
                "qid": 176828,
                "cveids": [
                    "CVE-2018-0735",
                    "CVE-2018-5407"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u10"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u10"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192955",
                "lastFound": "1726570859874",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-hxqx-xwvh-44m2)",
                "qid": 988310,
                "cveids": [
                    "CVE-2022-30122"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.9.1",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860238",
                "lastFound": "1726570860238",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxml2 (DSA 3952-1)",
                "qid": 176131,
                "cveids": [
                    "CVE-2017-0663",
                    "CVE-2017-7375",
                    "CVE-2017-7376",
                    "CVE-2017-9047",
                    "CVE-2017-9048",
                    "CVE-2017-9049",
                    "CVE-2017-9050"
                ],
                "cvssInfo": {
                    "baseScore": "10.0",
                    "temporalScore": "7.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxml2:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u5"
                    },
                    {
                        "name": "libxml2-dev:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192931",
                "lastFound": "1726570859854",
                "published": 1504042524000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DSA 3863-1)",
                "qid": 176047,
                "cveids": [
                    "CVE-2017-7606",
                    "CVE-2017-7619",
                    "CVE-2017-7941",
                    "CVE-2017-7943",
                    "CVE-2017-8343",
                    "CVE-2017-8344",
                    "CVE-2017-8345",
                    "CVE-2017-8346",
                    "CVE-2017-8347",
                    "CVE-2017-8348",
                    "CVE-2017-8349",
                    "CVE-2017-8350",
                    "CVE-2017-8351",
                    "CVE-2017-8352",
                    "CVE-2017-8353",
                    "CVE-2017-8354",
                    "CVE-2017-8355",
                    "CVE-2017-8356",
                    "CVE-2017-8357",
                    "CVE-2017-8765",
                    "CVE-2017-8830",
                    "CVE-2017-9098",
                    "CVE-2017-9141",
                    "CVE-2017-9142",
                    "CVE-2017-9143",
                    "CVE-2017-9144"
                ],
                "cvssInfo": {
                    "baseScore": "7.1",
                    "temporalScore": "5.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192926",
                "lastFound": "1726570859849",
                "published": 1496311197000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libexif (DLA 2222-1)",
                "qid": 177827,
                "cveids": [
                    "CVE-2018-20030",
                    "CVE-2020-13112",
                    "CVE-2020-13113",
                    "CVE-2020-13114",
                    "CVE-2020-0093"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "5.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libexif-dev",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u3"
                    },
                    {
                        "name": "libexif12:amd64",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192982",
                "lastFound": "1726570859900",
                "published": 1592829964000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxml2 (DLA 2048-1)",
                "qid": 177566,
                "cveids": [
                    "CVE-2019-19956"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxml2:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u8"
                    },
                    {
                        "name": "libxml2-dev:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192977",
                "lastFound": "1726570859896",
                "published": 1578572917000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for mysql-5.5 (DSA 3922-1)",
                "qid": 176102,
                "cveids": [
                    "CVE-2017-3635",
                    "CVE-2017-3636",
                    "CVE-2017-3641",
                    "CVE-2017-3648",
                    "CVE-2017-3651",
                    "CVE-2017-3652",
                    "CVE-2017-3653"
                ],
                "cvssInfo": {
                    "baseScore": "4.9",
                    "temporalScore": "3.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.3",
                    "temporalScore": "4.6"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmysqlclient18:amd64",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.57-0+deb8u1"
                    },
                    {
                        "name": "mysql-client",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.57-0+deb8u1"
                    },
                    {
                        "name": "mysql-client-5.5",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.57-0+deb8u1"
                    },
                    {
                        "name": "libmysqlclient-dev",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.57-0+deb8u1"
                    },
                    {
                        "name": "mysql-common",
                        "version": "5.5.53-0+deb8u1",
                        "fixVersion": "5.5.57-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192930",
                "lastFound": "1726570859853",
                "published": 1502101038000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for icu (DSA 4150-1)",
                "qid": 176332,
                "cveids": [
                    "CVE-2017-15422"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libicu52:amd64",
                        "version": "52.1-8+deb8u4",
                        "fixVersion": "52.1-8+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192942",
                "lastFound": "1726570859862",
                "published": 1522412258000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for loofah (GHSA-g4xq-jx4w-4cjv)",
                "qid": 988691,
                "cveids": [
                    "CVE-2018-16468"
                ],
                "cvssInfo": {
                    "baseScore": "3.5",
                    "temporalScore": "2.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.4",
                    "temporalScore": "4.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "loofah",
                        "version": "2.0.3",
                        "fixVersion": "2.2.3",
                        "packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860566",
                "lastFound": "1726570860566",
                "published": 1667826875000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libexif (DLA 2100-1)",
                "qid": 177659,
                "cveids": [
                    "CVE-2019-9278",
                    "CVE-2020-0181"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.0",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libexif-dev",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u1"
                    },
                    {
                        "name": "libexif12:amd64",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192979",
                "lastFound": "1726570859897",
                "published": 1585568825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for nokogiri (GHSA-xxx9-3xcr-gjj3)",
                "qid": 988059,
                "cveids": [
                    "CVE-2022-23437"
                ],
                "cvssInfo": {
                    "baseScore": "7.1",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.13.4",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860183",
                "lastFound": "1726570860183",
                "published": 1665668565000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true
                }
            },
            {
                "title": "Debian Security Update for expat (DLA 1912-1)",
                "qid": 177324,
                "cveids": [
                    "CVE-2019-15903"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libexpat1-dev:amd64",
                        "version": "2.1.0-6+deb8u3",
                        "fixVersion": "2.1.0-6+deb8u6"
                    },
                    {
                        "name": "libexpat1:amd64",
                        "version": "2.1.0-6+deb8u3",
                        "fixVersion": "2.1.0-6+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192972",
                "lastFound": "1726570859889",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for curl (DSA 4202-1)",
                "qid": 176381,
                "cveids": [
                    "CVE-2018-1000301"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u11"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u11"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u11"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u11"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192943",
                "lastFound": "1726570859863",
                "published": 1526899896000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for gdk-pixbuf (DLA 2043-1)",
                "qid": 177892,
                "cveids": [
                    "CVE-2016-6352",
                    "CVE-2017-2870",
                    "CVE-2017-6312",
                    "CVE-2017-6313",
                    "CVE-2017-6314"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gir1.2-gdkpixbuf-2.0",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-dev",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-0:amd64",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    },
                    {
                        "name": "libgdk-pixbuf2.0-common",
                        "version": "2.31.1-2+deb8u5",
                        "fixVersion": "2.31.1-2+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192984",
                "lastFound": "1726570859902",
                "published": 1592829965000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxml2 (DLA 1524-1)",
                "qid": 177229,
                "cveids": [
                    "CVE-2017-18258",
                    "CVE-2018-9251",
                    "CVE-2018-14404",
                    "CVE-2018-14567"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxml2:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u7"
                    },
                    {
                        "name": "libxml2-dev:amd64",
                        "version": "2.9.1+dfsg1-5+deb8u3",
                        "fixVersion": "2.9.1+dfsg1-5+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192969",
                "lastFound": "1726570859886",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for git (DSA 4212-1)",
                "qid": 176394,
                "cveids": [
                    "CVE-2018-11235"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u6"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192945",
                "lastFound": "1726570859865",
                "published": 1528111651000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgcrypt20 (DSA 3901-1)",
                "qid": 176079,
                "cveids": [
                    "CVE-2017-7526"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.8",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgcrypt20:amd64",
                        "version": "1.6.3-2+deb8u2",
                        "fixVersion": "1.6.3-2+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192928",
                "lastFound": "1726570859852",
                "published": 1499682317000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for curl (DSA 4007-1)",
                "qid": 176186,
                "cveids": [
                    "CVE-2017-1000257"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.1",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libcurl3-gnutls:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u7"
                    },
                    {
                        "name": "libcurl4-openssl-dev:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u7"
                    },
                    {
                        "name": "libcurl3:amd64",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u7"
                    },
                    {
                        "name": "curl",
                        "version": "7.38.0-4+deb8u5",
                        "fixVersion": "7.38.0-4+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192935",
                "lastFound": "1726570859856",
                "published": 1510565038000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 1530-1)",
                "qid": 177103,
                "cveids": [
                    "CVE-2018-16412",
                    "CVE-2018-16413",
                    "CVE-2018-16642",
                    "CVE-2018-16643",
                    "CVE-2018-16644",
                    "CVE-2018-16645",
                    "CVE-2018-16749"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u14"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192964",
                "lastFound": "1726570859882",
                "published": 1566210022000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tzdata (DLA 1563-1)",
                "qid": 176809,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.0",
                    "temporalScore": "4.4"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "tzdata",
                        "version": "2016j-0+deb8u1",
                        "fixVersion": "2018g-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192954",
                "lastFound": "1726570859873",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Ruby (rubygems) Security Update for nokogiri (GHSA-7rrm-v45f-jp64)",
                "qid": 987482,
                "cveids": [
                    "CVE-2019-20388",
                    "CVE-2020-24977",
                    "CVE-2020-7595",
                    "CVE-2021-3516",
                    "CVE-2021-3517",
                    "CVE-2021-3518",
                    "CVE-2021-3537",
                    "CVE-2021-3541"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "nokogiri",
                        "version": "1.7.0.1",
                        "fixVersion": "1.11.4",
                        "packagePath": "usr/local/bundle/specifications/nokogiri-1.7.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570859967",
                "lastFound": "1726570859967",
                "published": 1663677763000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for gnutls28 (DSA 3884-1)",
                "qid": 176065,
                "cveids": [
                    "CVE-2017-7507"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgnutls-deb0-28:amd64",
                        "version": "3.3.8-6+deb8u3",
                        "fixVersion": "3.3.8-6+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192927",
                "lastFound": "1726570859851",
                "published": 1498130835000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for freetype (DSA 3839-1)",
                "qid": 176017,
                "cveids": [
                    "CVE-2016-10244",
                    "CVE-2017-8105",
                    "CVE-2017-8287"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libfreetype6:amd64",
                        "version": "2.5.2-3+deb8u1",
                        "fixVersion": "2.5.2-3+deb8u2"
                    },
                    {
                        "name": "libfreetype6-dev",
                        "version": "2.5.2-3+deb8u1",
                        "fixVersion": "2.5.2-3+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192923",
                "lastFound": "1726570859847",
                "published": 1494411859000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for systemd (DLA 1684-1)",
                "qid": 176686,
                "cveids": [
                    "CVE-2019-6454"
                ],
                "cvssInfo": {
                    "baseScore": "4.9",
                    "temporalScore": "3.9",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "udev",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u10"
                    },
                    {
                        "name": "libsystemd0:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u10"
                    },
                    {
                        "name": "systemd-sysv",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u10"
                    },
                    {
                        "name": "libudev1:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u10"
                    },
                    {
                        "name": "systemd",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192947",
                "lastFound": "1726570859867",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DLA 1574-1)",
                "qid": 176836,
                "cveids": [
                    "CVE-2018-18025"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u15"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192956",
                "lastFound": "1726570859875",
                "published": 1554890301000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionview (GHSA-cfjv-5498-mph5)",
                "qid": 988374,
                "cveids": [
                    "CVE-2020-15169"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "actionview",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.4",
                        "packagePath": "usr/local/bundle/specifications/actionview-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860320",
                "lastFound": "1726570860320",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-px3r-jm9g-c8w8)",
                "qid": 988608,
                "cveids": [
                    "CVE-2018-3741"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rails-html-sanitizer",
                        "version": "1.0.3",
                        "fixVersion": "1.0.4",
                        "packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860486",
                "lastFound": "1726570860486",
                "published": 1667826871000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libgcrypt20 (DLA 1931-1)",
                "qid": 177349,
                "cveids": [
                    "CVE-2019-13627"
                ],
                "cvssInfo": {
                    "baseScore": "2.6",
                    "temporalScore": "1.9",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "6.3",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgcrypt20:amd64",
                        "version": "1.6.3-2+deb8u2",
                        "fixVersion": "1.6.3-2+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192973",
                "lastFound": "1726570859890",
                "published": 1570056498000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for gcc-4.9 (DSA 4117-1)",
                "qid": 176298,
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "0.0",
                    "temporalScore": "0.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libstdc++6:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libasan1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libstdc++-4.9-dev:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libgomp1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libubsan0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "gcc-4.9",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libgcc-4.9-dev:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libtsan0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "g++-4.9",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libatomic1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libcilkrts5:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "cpp-4.9",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "gcc-4.9-base:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "liblsan0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libquadmath0:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    },
                    {
                        "name": "libitm1:amd64",
                        "version": "4.9.2-10",
                        "fixVersion": "4.9.2-10+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192940",
                "lastFound": "1726570859861",
                "published": 1519205533000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for wget (DSA 4195-1)",
                "qid": 176375,
                "cveids": [
                    "CVE-2018-0494"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "wget",
                        "version": "1.16-1+deb8u1",
                        "fixVersion": "1.16-1+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192943",
                "lastFound": "1726570859863",
                "published": 1525952240000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for djvulibre (DLA 1902-1)",
                "qid": 177331,
                "cveids": [
                    "CVE-2019-15142",
                    "CVE-2019-15143",
                    "CVE-2019-15144",
                    "CVE-2019-15145"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libdjvulibre-dev:amd64",
                        "version": "3.5.25.4-4+b1",
                        "fixVersion": "3.5.25.4-4+deb8u1"
                    },
                    {
                        "name": "libdjvulibre-text",
                        "version": "3.5.25.4-4",
                        "fixVersion": "3.5.25.4-4+deb8u1"
                    },
                    {
                        "name": "libdjvulibre21:amd64",
                        "version": "3.5.25.4-4+b1",
                        "fixVersion": "3.5.25.4-4+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192972",
                "lastFound": "1726570859889",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libvpx (DLA 2012-1)",
                "qid": 177877,
                "cveids": [
                    "CVE-2019-9232",
                    "CVE-2019-9433"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libvpx1:amd64",
                        "version": "1.3.0-3",
                        "fixVersion": "1.3.0-3+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192984",
                "lastFound": "1726570859902",
                "published": 1592829965000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for subversion (DLA 1903-1)",
                "qid": 177301,
                "cveids": [
                    "CVE-2018-11782",
                    "CVE-2019-0203"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "subversion",
                        "version": "1.8.10-6+deb8u4",
                        "fixVersion": "1.8.10-6+deb8u7"
                    },
                    {
                        "name": "libsvn1:amd64",
                        "version": "1.8.10-6+deb8u4",
                        "fixVersion": "1.8.10-6+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192970",
                "lastFound": "1726570859888",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-9h9g-93gc-623h)",
                "qid": 990939,
                "cveids": [
                    "CVE-2022-23519"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.3",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rails-html-sanitizer",
                        "version": "1.0.3",
                        "fixVersion": "1.4.4",
                        "packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860580",
                "lastFound": "1726570860580",
                "published": 1672837004000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DLA 1897-1)",
                "qid": 177330,
                "cveids": [
                    "CVE-2019-14973"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u9"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u9"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192972",
                "lastFound": "1726570859889",
                "published": 1569235400000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for libjpeg-turbo (DLA 1719-1)",
                "qid": 176652,
                "cveids": [
                    "CVE-2018-14498"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libjpeg62-turbo:amd64",
                        "version": "1:1.3.1-12",
                        "fixVersion": "1:1.3.1-12+deb8u2"
                    },
                    {
                        "name": "libjpeg-dev",
                        "version": "1:1.3.1-12",
                        "fixVersion": "1:1.3.1-12+deb8u2"
                    },
                    {
                        "name": "libjpeg62-turbo-dev:amd64",
                        "version": "1:1.3.1-12",
                        "fixVersion": "1:1.3.1-12+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192947",
                "lastFound": "1726570859866",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libxslt (DLA 1973-1)",
                "qid": 177429,
                "cveids": [
                    "CVE-2019-18197"
                ],
                "cvssInfo": {
                    "baseScore": "5.1",
                    "temporalScore": "3.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libxslt1-dev:amd64",
                        "version": "1.1.28-2+deb8u2",
                        "fixVersion": "1.1.28-2+deb8u6"
                    },
                    {
                        "name": "libxslt1.1:amd64",
                        "version": "1.1.28-2+deb8u2",
                        "fixVersion": "1.1.28-2+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192974",
                "lastFound": "1726570859892",
                "published": 1572345060000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for perl (DSA 3873-1)",
                "qid": 176052,
                "cveids": [
                    "CVE-2017-6512"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "perl",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u7"
                    },
                    {
                        "name": "perl-modules",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u7"
                    },
                    {
                        "name": "perl-base",
                        "version": "5.20.2-3+deb8u6",
                        "fixVersion": "5.20.2-3+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192926",
                "lastFound": "1726570859850",
                "published": 1496913696000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for gnupg (DSA 3960-1)",
                "qid": 176139,
                "cveids": [
                    "CVE-2017-7526"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.8",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "gpgv",
                        "version": "1.4.18-7+deb8u3",
                        "fixVersion": "1.4.18-7+deb8u4"
                    },
                    {
                        "name": "gnupg",
                        "version": "1.4.18-7+deb8u3",
                        "fixVersion": "1.4.18-7+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192931",
                "lastFound": "1726570859854",
                "published": 1505381043000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for git (DLA 2182-1)",
                "qid": 177759,
                "cveids": [
                    "CVE-2020-11008"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "git-man",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u10"
                    },
                    {
                        "name": "git",
                        "version": "1:2.1.4-2.1+deb8u2",
                        "fixVersion": "1:2.1.4-2.1+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192981",
                "lastFound": "1726570859899",
                "published": 1588680879000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for expat (DLA 1839-1)",
                "qid": 177042,
                "cveids": [
                    "CVE-2018-20843"
                ],
                "cvssInfo": {
                    "baseScore": "7.8",
                    "temporalScore": "6.1",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libexpat1-dev:amd64",
                        "version": "2.1.0-6+deb8u3",
                        "fixVersion": "2.1.0-6+deb8u5"
                    },
                    {
                        "name": "libexpat1:amd64",
                        "version": "2.1.0-6+deb8u3",
                        "fixVersion": "2.1.0-6+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192961",
                "lastFound": "1726570859880",
                "published": 1563274190000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "denialOfService": true,
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Long Term Support (LTS) Security Update for Open Secure Sockets Layer (OpenSSL) (DLA 1449-1)",
                "qid": 177256,
                "cveids": [
                    "CVE-2018-0732",
                    "CVE-2018-0737"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u9"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u9"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192970",
                "lastFound": "1726570859887",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for glibc (DSA 3887-1) (Stack Clash)",
                "qid": 176066,
                "cveids": [
                    "CVE-2017-1000366"
                ],
                "cvssInfo": {
                    "baseScore": "7.2",
                    "temporalScore": "6.0",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libc6-dev:amd64",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "libc-dev-bin",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "libc6:amd64",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "libc-bin",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    },
                    {
                        "name": "multiarch-support",
                        "version": "2.19-18+deb8u6",
                        "fixVersion": "2.19-18+deb8u10"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192927",
                "lastFound": "1726570859850",
                "published": 1497920001000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "activeAttacks": true,
                    "denialOfService": true,
                    "easyExploit": true,
                    "highDataLoss": true,
                    "highLateralMovement": true,
                    "malware": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for openssh (DLA 1728-1)",
                "qid": 176756,
                "cveids": [
                    "CVE-2018-20685",
                    "CVE-2019-6109",
                    "CVE-2019-6111"
                ],
                "cvssInfo": {
                    "baseScore": "5.8",
                    "temporalScore": "4.8",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.8",
                    "temporalScore": "6.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "openssh-client",
                        "version": "1:6.7p1-5+deb8u3",
                        "fixVersion": "1:6.7p1-5+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192952",
                "lastFound": "1726570859870",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "activeAttacks": true,
                    "malware": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DLA 1680-1)",
                "qid": 176680,
                "cveids": [
                    "CVE-2018-17000",
                    "CVE-2018-19210",
                    "CVE-2019-7663"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u8"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u8"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u8"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192947",
                "lastFound": "1726570859866",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgcrypt20 (DSA 3880-1)",
                "qid": 176059,
                "cveids": [
                    "CVE-2017-9526"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.2",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.9",
                    "temporalScore": "5.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libgcrypt20:amd64",
                        "version": "1.6.3-2+deb8u2",
                        "fixVersion": "1.6.3-2+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192926",
                "lastFound": "1726570859850",
                "published": 1497519708000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for postgresql-9.4 (DLA 1464-1)",
                "qid": 177156,
                "cveids": [
                    "CVE-2018-10915"
                ],
                "cvssInfo": {
                    "baseScore": "6.0",
                    "temporalScore": "4.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libpq-dev",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.19-0+deb8u1"
                    },
                    {
                        "name": "postgresql-client-9.4",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.19-0+deb8u1"
                    },
                    {
                        "name": "libpq5:amd64",
                        "version": "9.4.9-0+deb8u1",
                        "fixVersion": "9.4.19-0+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192966",
                "lastFound": "1726570859884",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for openssl (DSA 4018-1)",
                "qid": 176197,
                "cveids": [
                    "CVE-2017-3735",
                    "CVE-2017-3736"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "6.5",
                    "temporalScore": "5.7"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libssl1.0.0:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u7"
                    },
                    {
                        "name": "libssl-dev:amd64",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u7"
                    },
                    {
                        "name": "openssl",
                        "version": "1.0.1t-1+deb8u5",
                        "fixVersion": "1.0.1t-1+deb8u7"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192936",
                "lastFound": "1726570859857",
                "published": 1510565038000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DLA 1411-1)",
                "qid": 177175,
                "cveids": [
                    "CVE-2017-11613",
                    "CVE-2018-5784",
                    "CVE-2018-7456",
                    "CVE-2018-8905",
                    "CVE-2018-10963",
                    "CVE-2017-13726",
                    "CVE-2017-18013"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.8",
                    "temporalScore": "7.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u6"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u6"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192967",
                "lastFound": "1726570859885",
                "published": 1566210023000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for sqlite3 (DLA 1613-1)",
                "qid": 176787,
                "cveids": [
                    "CVE-2018-20346",
                    "CVE-2018-20506"
                ],
                "cvssInfo": {
                    "baseScore": "6.8",
                    "temporalScore": "5.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "8.1",
                    "temporalScore": "7.3"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libsqlite3-dev:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u3"
                    },
                    {
                        "name": "libsqlite3-0:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u3"
                    },
                    {
                        "name": "sqlite3",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192953",
                "lastFound": "1726570859872",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for lcms2 (DSA 3774-1)",
                "qid": 175950,
                "cveids": [
                    "CVE-2016-10165"
                ],
                "cvssInfo": {
                    "baseScore": "5.8",
                    "temporalScore": "4.3",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.1",
                    "temporalScore": "6.2"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "liblcms2-2:amd64",
                        "version": "2.6-3+b3",
                        "fixVersion": "2.6-3+deb8u1"
                    },
                    {
                        "name": "liblcms2-dev:amd64",
                        "version": "2.6-3+b3",
                        "fixVersion": "2.6-3+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192919",
                "lastFound": "1726570859844",
                "published": 1485856043000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Debian Security Update for systemd (DLA 1639-1)",
                "qid": 176715,
                "cveids": [
                    "CVE-2018-16864",
                    "CVE-2018-16865"
                ],
                "cvssInfo": {
                    "baseScore": "4.6",
                    "temporalScore": "3.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "7.8",
                    "temporalScore": "7.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "udev",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u9"
                    },
                    {
                        "name": "libsystemd0:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u9"
                    },
                    {
                        "name": "systemd-sysv",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u9"
                    },
                    {
                        "name": "libudev1:amd64",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u9"
                    },
                    {
                        "name": "systemd",
                        "version": "215-17+deb8u5",
                        "fixVersion": "215-17+deb8u9"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192950",
                "lastFound": "1726570859868",
                "published": 1553546619000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for e2fsprogs (DLA 2156-1)",
                "qid": 177707,
                "cveids": [
                    "CVE-2019-5188"
                ],
                "cvssInfo": {
                    "baseScore": "4.4",
                    "temporalScore": "3.4",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "6.7",
                    "temporalScore": "6.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "e2fslibs:amd64",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u2"
                    },
                    {
                        "name": "libcomerr2:amd64",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u2"
                    },
                    {
                        "name": "e2fsprogs",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u2"
                    },
                    {
                        "name": "libss2:amd64",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192980",
                "lastFound": "1726570859898",
                "published": 1585568825000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-jp5v-5gx4-jmj9)",
                "qid": 988377,
                "cveids": [
                    "CVE-2020-8166"
                ],
                "cvssInfo": {
                    "baseScore": "4.3",
                    "temporalScore": "3.4",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "4.3",
                    "temporalScore": "3.9"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.4.3",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860333",
                "lastFound": "1726570860333",
                "published": 1666790958000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for imagemagick (DSA 4040-1)",
                "qid": 176220,
                "cveids": [
                    "CVE-2017-11352",
                    "CVE-2017-11640",
                    "CVE-2017-12431",
                    "CVE-2017-12640",
                    "CVE-2017-12877",
                    "CVE-2017-12983",
                    "CVE-2017-13134",
                    "CVE-2017-13139",
                    "CVE-2017-13144",
                    "CVE-2017-13758",
                    "CVE-2017-13769",
                    "CVE-2017-14224",
                    "CVE-2017-14607",
                    "CVE-2017-14682",
                    "CVE-2017-14989",
                    "CVE-2017-15277",
                    "CVE-2017-16546"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libmagickcore-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickcore-6-arch-config:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickcore-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickcore-6.q16-2-extra:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickwand-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "imagemagick-6.q16",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "imagemagick",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickwand-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickwand-6-headers",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "imagemagick-common",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickcore-dev",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickwand-6.q16-2:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    },
                    {
                        "name": "libmagickcore-6.q16-dev:amd64",
                        "version": "8:6.8.9.9-5+deb8u6",
                        "fixVersion": "8:6.8.9.9-5+deb8u11"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192936",
                "lastFound": "1726570859858",
                "published": 1513153124000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for subversion (DSA 3932-1)",
                "qid": 176108,
                "cveids": [
                    "CVE-2016-8734",
                    "CVE-2017-9800"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "subversion",
                        "version": "1.8.10-6+deb8u4",
                        "fixVersion": "1.8.10-6+deb8u5"
                    },
                    {
                        "name": "libsvn1:amd64",
                        "version": "1.8.10-6+deb8u4",
                        "fixVersion": "1.8.10-6+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192930",
                "lastFound": "1726570859853",
                "published": 1502964196000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for e2fsprogs (DLA 1935-1)",
                "qid": 177354,
                "cveids": [
                    "CVE-2019-5094"
                ],
                "cvssInfo": {
                    "baseScore": "4.6",
                    "temporalScore": "3.6",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "6.7",
                    "temporalScore": "6.0"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "e2fslibs:amd64",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u1"
                    },
                    {
                        "name": "libcomerr2:amd64",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u1"
                    },
                    {
                        "name": "e2fsprogs",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u1"
                    },
                    {
                        "name": "libss2:amd64",
                        "version": "1.42.12-2",
                        "fixVersion": "1.42.12-2+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192973",
                "lastFound": "1726570859890",
                "published": 1570056498000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for tiff (DSA 3844-1)",
                "qid": 176022,
                "cveids": [
                    "CVE-2016-3658",
                    "CVE-2016-9535",
                    "CVE-2016-10266",
                    "CVE-2016-10267",
                    "CVE-2016-10269",
                    "CVE-2016-10270",
                    "CVE-2017-5225",
                    "CVE-2017-7592",
                    "CVE-2017-7593",
                    "CVE-2017-7594",
                    "CVE-2017-7595",
                    "CVE-2017-7596",
                    "CVE-2017-7597",
                    "CVE-2017-7598",
                    "CVE-2017-7599",
                    "CVE-2017-7600",
                    "CVE-2017-7601",
                    "CVE-2017-7602"
                ],
                "cvssInfo": {
                    "baseScore": "7.5",
                    "temporalScore": "5.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "9.8",
                    "temporalScore": "8.8"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "libtiff5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u3"
                    },
                    {
                        "name": "libtiff5-dev:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u3"
                    },
                    {
                        "name": "libtiffxx5:amd64",
                        "version": "4.0.3-12.3+deb8u1",
                        "fixVersion": "4.0.3-12.3+deb8u3"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192923",
                "lastFound": "1726570859847",
                "published": 1494411859000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rails-html-sanitizer (GHSA-rrfc-7g8p-99q8)",
                "qid": 991020,
                "cveids": [
                    "CVE-2022-23520"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.3",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "6.1",
                    "temporalScore": "5.5"
                },
                "severity": 3,
                "customerSeverity": 3,
                "risk": 30,
                "software": [
                    {
                        "name": "rails-html-sanitizer",
                        "version": "1.0.3",
                        "fixVersion": "1.4.4",
                        "packagePath": "usr/local/bundle/specifications/rails-html-sanitizer-1.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860604",
                "lastFound": "1726570860604",
                "published": 1672837005000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for activesupport (GHSA-j6gc-792m-qgm2)",
                "qid": 991711,
                "cveids": [
                    "CVE-2023-22796"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.0",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "activesupport",
                        "version": "5.0.1",
                        "fixVersion": "6.1.7.1",
                        "packagePath": "usr/local/bundle/specifications/activesupport-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860707",
                "lastFound": "1726570860707",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for libxdmcp (DLA 2006-1)",
                "qid": 177530,
                "cveids": [
                    "CVE-2017-2625"
                ],
                "cvssInfo": {
                    "baseScore": "2.1",
                    "temporalScore": "1.7",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "libxdmcp6:amd64",
                        "version": "1:1.1.1-1+b1",
                        "fixVersion": "1:1.1.1-1+deb8u1"
                    },
                    {
                        "name": "libxdmcp-dev:amd64",
                        "version": "1:1.1.1-1+b1",
                        "fixVersion": "1:1.1.1-1+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192976",
                "lastFound": "1726570859893",
                "published": 1577703922000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for loofah (GHSA-c3gv-9cxf-6f57)",
                "qid": 988349,
                "cveids": [
                    "CVE-2019-15587"
                ],
                "cvssInfo": {
                    "baseScore": "3.5",
                    "temporalScore": "2.6",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "5.4",
                    "temporalScore": "4.7"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "loofah",
                        "version": "2.0.3",
                        "fixVersion": "2.3.1",
                        "packagePath": "usr/local/bundle/specifications/loofah-2.0.3.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860317",
                "lastFound": "1726570860317",
                "published": 1666790957000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {}
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-8xww-x3g3-6jcv)",
                "qid": 991704,
                "cveids": [
                    "CVE-2023-22795"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.0",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.8.15",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860682",
                "lastFound": "1726570860682",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-65f5-mfpf-vfhj)",
                "qid": 991712,
                "cveids": [
                    "CVE-2022-44570"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.9.2",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860709",
                "lastFound": "1726570860709",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-93pm-5p5f-3ghx)",
                "qid": 991717,
                "cveids": [
                    "CVE-2022-44571"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.9.2",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860726",
                "lastFound": "1726570860726",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for tar (DLA 1623-1)",
                "qid": 176801,
                "cveids": [
                    "CVE-2018-20482"
                ],
                "cvssInfo": {
                    "baseScore": "1.9",
                    "temporalScore": "1.4",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "4.7",
                    "temporalScore": "4.2"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "tar",
                        "version": "1.27.1-2+deb8u1",
                        "fixVersion": "1.27.1-2+deb8u2"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192954",
                "lastFound": "1726570859873",
                "published": 1554375138000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for rack (GHSA-rqv2-275x-2jq5)",
                "qid": 991714,
                "cveids": [
                    "CVE-2022-44572"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "rack",
                        "version": "2.0.1",
                        "fixVersion": "2.0.9.2",
                        "packagePath": "usr/local/bundle/specifications/rack-2.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860724",
                "lastFound": "1726570860724",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Debian Security Update for libexif (DLA 2249-1)",
                "qid": 177871,
                "cveids": [
                    "CVE-2020-0182",
                    "CVE-2020-0198"
                ],
                "cvssInfo": {
                    "baseScore": "6.4",
                    "temporalScore": "4.7",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "libexif-dev",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u4"
                    },
                    {
                        "name": "libexif12:amd64",
                        "version": "0.6.21-2",
                        "fixVersion": "0.6.21-2+deb8u4"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192983",
                "lastFound": "1726570859901",
                "published": 1592829965000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for globalid (GHSA-23c2-gwp5-pxw9)",
                "qid": 991713,
                "cveids": [
                    "CVE-2023-22799"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.0",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "globalid",
                        "version": "0.3.7",
                        "fixVersion": "1.0.1",
                        "packagePath": "usr/local/bundle/specifications/globalid-0.3.7.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860722",
                "lastFound": "1726570860722",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true
                }
            },
            {
                "title": "Debian Security Update for libice (DLA 2002-1)",
                "qid": 177528,
                "cveids": [
                    "CVE-2017-2626"
                ],
                "cvssInfo": {
                    "baseScore": "2.1",
                    "temporalScore": "1.7",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "libice6:amd64",
                        "version": "2:1.0.9-1+b1",
                        "fixVersion": "2:1.0.9-1+deb8u1"
                    },
                    {
                        "name": "libice-dev:amd64",
                        "version": "2:1.0.9-1+b1",
                        "fixVersion": "2:1.0.9-1+deb8u1"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192975",
                "lastFound": "1726570859893",
                "published": 1577703921000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for sqlite3 (DLA 2221-1)",
                "qid": 177834,
                "cveids": [
                    "CVE-2020-13434"
                ],
                "cvssInfo": {
                    "baseScore": "2.1",
                    "temporalScore": "1.7",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "5.5",
                    "temporalScore": "5.0"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "libsqlite3-dev:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u6"
                    },
                    {
                        "name": "libsqlite3-0:amd64",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u6"
                    },
                    {
                        "name": "sqlite3",
                        "version": "3.8.7.1-1+deb8u2",
                        "fixVersion": "3.8.7.1-1+deb8u6"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192983",
                "lastFound": "1726570859901",
                "published": 1592829964000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-9chr-4fjh-5rgw)",
                "qid": 990768,
                "cveids": [
                    "CVE-2022-3704"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.9",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "5.4",
                    "temporalScore": "5.1"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "None",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860572",
                "lastFound": "1726570860572",
                "published": 1671022114000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true,
                    "noPatch": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for actionpack (GHSA-p84v-45xj-wwqj)",
                "qid": 991702,
                "cveids": [
                    "CVE-2023-22792"
                ],
                "cvssInfo": {
                    "baseScore": "5.4",
                    "temporalScore": "4.0",
                    "accessVector": "Adjacent Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.5"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "actionpack",
                        "version": "5.0.1",
                        "fixVersion": "5.2.8.15",
                        "packagePath": "usr/local/bundle/specifications/actionpack-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860639",
                "lastFound": "1726570860639",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "highLateralMovement": true
                }
            },
            {
                "title": "Rubygems (Rubygems) Security Update for activerecord (GHSA-579w-22j4-4749)",
                "qid": 991707,
                "cveids": [
                    "CVE-2022-44566"
                ],
                "cvssInfo": {
                    "baseScore": "5.0",
                    "temporalScore": "3.9",
                    "accessVector": "Network"
                },
                "cvss3Info": {
                    "baseScore": "7.5",
                    "temporalScore": "6.7"
                },
                "severity": 2,
                "customerSeverity": 2,
                "risk": 20,
                "software": [
                    {
                        "name": "activerecord",
                        "version": "5.0.1",
                        "fixVersion": "5.2.8.15",
                        "packagePath": "usr/local/bundle/specifications/activerecord-5.0.1.gemspec"
                    }
                ],
                "category": "SCA",
                "firstFound": "1726570860684",
                "lastFound": "1726570860684",
                "published": 1674570934000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "easyExploit": true,
                    "publicExploit": true
                }
            },
            {
                "title": "Debian Security Update for libgcrypt20 (DLA 1405-1)",
                "qid": 177217,
                "cveids": [
                    "CVE-2018-0495"
                ],
                "cvssInfo": {
                    "baseScore": "1.9",
                    "temporalScore": "1.4",
                    "accessVector": "Local"
                },
                "cvss3Info": {
                    "baseScore": "4.7",
                    "temporalScore": "4.2"
                },
                "severity": 1,
                "customerSeverity": 1,
                "risk": 10,
                "software": [
                    {
                        "name": "libgcrypt20:amd64",
                        "version": "1.6.3-2+deb8u2",
                        "fixVersion": "1.6.3-2+deb8u5"
                    }
                ],
                "category": "Debian",
                "firstFound": "1726223192968",
                "lastFound": "1726570859886",
                "published": 1566210024000,
                "typeDetected": "CONFIRMED",
                "threatIntel": {
                    "publicExploit": true
                }
            }
        ],
        "vulnSummary": {
            "confirmed": {
                "sev1Count": 1,
                "sev2Count": 15,
                "sev3Count": 188,
                "sev4Count": 61,
                "sev5Count": 14
            },
            "potential": {},
            "patchAvailability": {
                "confirmed": {
                    "sev1Count": 1,
                    "sev2Count": 14,
                    "sev3Count": 187,
                    "sev4Count": 61,
                    "sev5Count": 13
                },
                "potential": {}
            }
        }
    },
    "PolicyEvaluation": {}
}                 

Tabular Report

See the sample vulnerability report in Tabular format.

This report is not generated if your QScanner is running in Quiet mode (if you have used --quiet flag during the scan).

SARIF Report

Sample SARIF report generated by QScanner is shown below.

 {
  "version": "2.1.0",
  "$schema": "https://json.schemastore.org/sarif-2.1.0.json",
  "runs": [
    {
      "tool": {
        "driver": {
          "fullName": "Qualys CLI Scanner",
          "informationUri": "http://www.qualys.com",
          "name": "qscanner",
          "rules": [
            {
              "id": "184903",
              "name": "Vulnerability",
              "shortDescription": {
                "text": "Debian Security Update for zliblibz-mingw-w64 (CVE-2022-37434)"
              },
              "defaultConfiguration": {
                "level": "error"
              },
              "properties": {
                "customerSeverity": 5,
                "cve-ids": [
                  "CVE-2022-37434"
                ],
                "cvss3Info": {
                  "baseScore": "9.8",
                  "temporalScore": "8.8"
                },
                "cvssInfo": {
                  "baseScore": "5.4",
                  "temporalScore": "4.3",
                  "accessVector": "Adjacent Network"
                },
                "risk": 50,
                "severity": 5
              }
            },
            {
              "id": "PolicyEvaluationResult",
              "name": "PolicyEvaluation",
              "shortDescription": {
                "text": "No active policy is assigned with these tags: [] and there is also no active default policy available."
              },
              "defaultConfiguration": {
                "level": "warning"
              }
            },
            {
              "id": "ff34aaee-e4c2-11ed-b5ea-0242ac120002",
              "name": "Secret",
              "shortDescription": {
                "text": "SSH public key DSA"
              },
              "defaultConfiguration": {
                "level": "error"
              }
            },
            {
              "id": "ac882852-c960-11ed-afa1-0242ac120002",
              "name": "Secret",
              "shortDescription": {
                "text": "Private Key"
              },
              "defaultConfiguration": {
                "level": "error"
              }
            }
          ],
          "version": "4.0.0-38"
        }
      },
      "results": [
        {
          "properties": {
            "QID": 184903,
            "fixedVersion": "1:1.2.11.dfsg-4.1",
            "installedVersion": "1.2.13.dfsg-1",
            "layerSHA": "sha256:2fa37f2ee66efbd308b9b91bce81c262f5e6ab6c3bf8056632afc60cc602785c",
            "patchAvailable": true,
            "softwareName": "zlib1g",
            "softwarePath": ""
          },
          "ruleId": "184903",
          "ruleIndex": 0,
          "level": "error",
          "message": {
            "text": "Debian Security Update for zliblibz-mingw-w64 (CVE-2022-37434)"
          }
        },
        {
          "properties": {
            "action": "AUDIT",
            "evaluatedAt": "2023-12-11 09:45:02"
          },
          "ruleId": "PolicyEvaluationResult",
          "ruleIndex": 1,
          "level": "warning",
          "message": {
            "text": "No active policy is assigned with these tags: [] and there is also no active default policy available."
          }
        },
        {
          "properties": {
            "category": "PublicKey",
            "layerSHA": "sha256:2ef3351afa6d94a8874a6af5aa1bafcd85106616ced8ac63112022fb04232d03",
            "title": "SSH public key DSA"
          },
          "ruleId": "ff34aaee-e4c2-11ed-b5ea-0242ac120002",
          "ruleIndex": 2,
          "level": "error",
          "message": {
            "text": "   using the \"key::\" prefix mechanism (e.g. \"key::*******************"
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "/usr/share/doc/git/RelNotes/2.35.0.txt"
                },
                "region": {
                  "startLine": 62,
                  "endLine": 62
                }
              }
            }
          ]
        },
        {
          "properties": {
            "category": "AsymmetricPrivateKey",
            "layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
            "title": "Private Key"
          },
          "ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
          "ruleIndex": 3,
          "level": "error",
          "message": {
            "text": "\tkeyPem := []byte(`-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "/usr/local/go/src/crypto/tls/example_test.go"
                },
                "region": {
                  "startLine": 139,
                  "endLine": 139
                }
              }
            }
          ]
        },
        {
          "properties": {
            "category": "AsymmetricPrivateKey",
            "layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
            "title": "Private Key"
          },
          "ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
          "ruleIndex": 3,
          "level": "error",
          "message": {
            "text": "\tkeyPem := []byte(`-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "/usr/local/go/src/crypto/tls/example_test.go"
                },
                "region": {
                  "startLine": 164,
                  "endLine": 164
                }
              }
            }
          ]
        },
        {
          "properties": {
            "category": "AsymmetricPrivateKey",
            "layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
            "title": "Private Key"
          },
          "ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
          "ruleIndex": 3,
          "level": "error",
          "message": {
            "text": "-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "/usr/local/go/src/crypto/tls/testdata/example-key.pem"
                },
                "region": {
                  "startLine": 1,
                  "endLine": 1
                }
              }
            }
          ]
        },
        {
          "properties": {
            "category": "AsymmetricPrivateKey",
            "layerSHA": "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
            "title": "Private Key"
          },
          "ruleId": "ac882852-c960-11ed-afa1-0242ac120002",
          "ruleIndex": 3,
          "level": "error",
          "message": {
            "text": "-----BEGIN EC PRIVATE KEY-----************************************************************************************************************************************************************************"
          },
          "locations": [
            {
              "physicalLocation": {
                "artifactLocation": {
                  "uri": "/usr/local/go/src/crypto/x509/platform_root_key.pem"
                },
                "region": {
                  "startLine": 1,
                  "endLine": 1
                }
              }
            }
          ]
        }
      ],
      "properties": {
        "architecture": "amd64",
        "imageID": "sha256:015e6b7f599b15be5eecad68608583d19d9fa2c8cc27cb6d254204e080dae199",
        "layers": [
          "sha256:2fa37f2ee66efbd308b9b91bce81c262f5e6ab6c3bf8056632afc60cc602785c",
          "sha256:5cc3a4df1251c008ebfaaf8c48fe7bd61f0b0fdd7273966bd4bbe58877337e06",
          "sha256:2ef3351afa6d94a8874a6af5aa1bafcd85106616ced8ac63112022fb04232d03",
          "sha256:e51777ae0bce0a05c4c294fc7c3fb6ac29fd215b900bd46bb9bb7302708bffeb",
          "sha256:fbc321379a11088c8b501eb89ac7e1f41d4b511b14c9914f2963683d92e78fd9",
          "sha256:fe7d12ddfc653078295fed87b3fd7498a496dc5176358fba91239d44d98997bd"
        ],
        "os": "Debian Linux 12.2",
        "repoTags": [
          "golang:latest"
        ]
      }
    }
  ]
}