Lookup for vulnerable packages by Package URL.

GET /api/packages/1036800?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1036800?format=api",
    "purl": "pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%2Bsqueeze1",
    "type": "deb",
    "namespace": "debian",
    "name": "heimdal",
    "version": "1.4.0~git20100726.dfsg.1-2+squeeze1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "7.7.0+dfsg-2+deb11u3",
    "latest_non_vulnerable_version": "7.7.0+dfsg-2+deb11u3",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api",
            "vulnerability_id": "VCID-21hz-xvek-73cd",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83706",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83736",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83777",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83772",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83806",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83807",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83808",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877",
                    "reference_id": "1705877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966",
                    "reference_id": "928966",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3976-1/",
                    "reference_id": "USN-3976-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3976-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3976-2/",
                    "reference_id": "USN-3976-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3976-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3"
                }
            ],
            "aliases": [
                "CVE-2018-16860"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api",
            "vulnerability_id": "VCID-3du2-evy8-jfa1",
            "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92532",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92558",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92542",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267",
                    "reference_id": "1024267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960",
                    "reference_id": "2140960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/advisories/",
                    "reference_id": "advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/advisories/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html",
                    "reference_id": "CVE-2022-42898.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-42898.html"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c",
                    "reference_id": "GHSA-64mq-fvfj-5x3c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-11",
                    "reference_id": "GLSA-202405-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-11"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/",
                    "reference_id": "krb5-1.19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.19/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/",
                    "reference_id": "ntap-20230223-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230223-0001/"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt",
                    "reference_id": "README-1.20.1.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637",
                    "reference_id": "RHSA-2022:8637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638",
                    "reference_id": "RHSA-2022:8638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639",
                    "reference_id": "RHSA-2022:8639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640",
                    "reference_id": "RHSA-2022:8640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641",
                    "reference_id": "RHSA-2022:8641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648",
                    "reference_id": "RHSA-2022:8648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662",
                    "reference_id": "RHSA-2022:8662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663",
                    "reference_id": "RHSA-2022:8663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669",
                    "reference_id": "RHSA-2022:8669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029",
                    "reference_id": "RHSA-2022:9029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9029"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203",
                    "reference_id": "show_bug.cgi?id=15203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5828-1/",
                    "reference_id": "USN-5828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5828-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-42898"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49838?format=api",
            "vulnerability_id": "VCID-5tkj-88u2-83ha",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50442",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50521",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50545",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5054",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50497",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50512",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50493",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50496",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52127",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5287",
                    "reference_id": "dsa-5287",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5287"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx",
                    "reference_id": "GHSA-mgqr-gvh6-23cx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html",
                    "reference_id": "msg00034.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5766-1/",
                    "reference_id": "USN-5766-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5766-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-41916"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkj-88u2-83ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93251?format=api",
            "vulnerability_id": "VCID-81xv-v927-8fdz",
            "summary": "The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48124",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48145",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48095",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48148",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48143",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48166",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48139",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4815",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48202",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48153",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3"
                }
            ],
            "aliases": [
                "CVE-2017-6594"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81xv-v927-8fdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49839?format=api",
            "vulnerability_id": "VCID-bc1t-hzu5-bffd",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78841",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78815",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78843",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7884",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78771",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78803",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78818",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4",
                    "reference_id": "GHSA-88pm-hfmq-7vv4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-44640"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70429?format=api",
            "vulnerability_id": "VCID-ezmy-qjh7-6ycj",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://h5l.org/advisories.html?show=2017-12-08",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h5l.org/advisories.html?show=2017-12-08"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88428",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88427",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8842",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88419",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88434",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8843",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8841",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88416",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0918",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0918",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0918",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92663",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/issues/353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/heimdal/heimdal/issues/353"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4055"
                },
                {
                    "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html"
                },
                {
                    "reference_url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439",
                    "reference_id": "CVE-2017-17439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3"
                }
            ],
            "aliases": [
                "CVE-2017-17439"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezmy-qjh7-6ycj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api",
            "vulnerability_id": "VCID-frnd-3wwy-93ek",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89278",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89297",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89317",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89324",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89338",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89332",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589",
                    "reference_id": "1778589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786",
                    "reference_id": "946786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-1/",
                    "reference_id": "USN-4217-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4217-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-2/",
                    "reference_id": "USN-4217-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4217-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2019-14870"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49836?format=api",
            "vulnerability_id": "VCID-jhcx-pb5e-8kev",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5744",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57411",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57481",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57438",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57464",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57434",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5741",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57462",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57465",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580",
                    "reference_id": "f9ec7002cdd526ae84fbacbf153162e118f22580",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv",
                    "reference_id": "GHSA-69h9-669w-88xv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2021-44758"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhcx-pb5e-8kev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74701?format=api",
            "vulnerability_id": "VCID-r49y-kqyv-pkbq",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86205",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86211",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86202",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89334",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89353",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8937",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89374",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89383",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89376",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098"
                },
                {
                    "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html",
                    "reference_id": "000009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jun/1"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf",
                    "reference_id": "2f7f3d9960aa6ea21358bdf3687cee5149aa35cf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72",
                    "reference_id": "3e58559...bbafe72",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064",
                    "reference_id": "929064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4455",
                    "reference_id": "dsa-4455",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2019/dsa-4455"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/",
                    "reference_id": "GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0",
                    "reference_id": "heimdal-7.6.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/",
                    "reference_id": "SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3"
                }
            ],
            "aliases": [
                "CVE-2019-12098"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r49y-kqyv-pkbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49841?format=api",
            "vulnerability_id": "VCID-rfpr-mdg9-3uaa",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25124",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25211",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25157",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25166",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25304",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25346",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25192",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25252",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2023/02/08/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2023/02/08/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849",
                    "reference_id": "1030849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672",
                    "reference_id": "2166672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5849-1/",
                    "reference_id": "USN-5849-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5849-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-45142"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfpr-mdg9-3uaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api",
            "vulnerability_id": "VCID-s2ne-rcp3-nbgz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72529",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72545",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72522",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72568",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72621",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774",
                    "reference_id": "2137774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437",
                    "reference_id": "CVE-2022-3437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-3437"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html",
                    "reference_id": "CVE-2022-3437.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-3437.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-3437"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63790?format=api",
            "vulnerability_id": "VCID-tcbv-cguk-hfg2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90912",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90922",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90932",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9095",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90959",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90983",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90981",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90982",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976",
                    "reference_id": "1469976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208",
                    "reference_id": "868208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209",
                    "reference_id": "868209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-1/",
                    "reference_id": "USN-3353-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-2/",
                    "reference_id": "USN-3353-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-3/",
                    "reference_id": "USN-3353-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-4/",
                    "reference_id": "USN-3353-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-4/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036803?format=api",
                    "purl": "pkg:deb/debian/heimdal@1.6~rc2%2Bdfsg-9%2Bdeb8u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-81xv-v927-8fdz"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.6~rc2%252Bdfsg-9%252Bdeb8u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037347?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-13%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-13%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050470?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3"
                }
            ],
            "aliases": [
                "CVE-2017-11103"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33935?format=api",
            "vulnerability_id": "VCID-unvx-tsxw-abbw",
            "summary": "A boundary error in Heimdal could result in execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9974",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99742",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99743",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99745",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325",
                    "reference_id": "770325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb",
                    "reference_id": "CVE-2011-4862;OSVDB-78020",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c",
                    "reference_id": "CVE-2011-4862;OSVDB-78020",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb",
                    "reference_id": "CVE-2011-4862;OSVDB-78020",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-14",
                    "reference_id": "GLSA-201201-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201202-05",
                    "reference_id": "GLSA-201202-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201202-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1851",
                    "reference_id": "RHSA-2011:1851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1851"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1852",
                    "reference_id": "RHSA-2011:1852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1852"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1853",
                    "reference_id": "RHSA-2011:1853",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1853"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1854",
                    "reference_id": "RHSA-2011:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1854"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036801?format=api",
                    "purl": "pkg:deb/debian/heimdal@1.6~git20120403%2Bdfsg1-2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-81xv-v927-8fdz"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.6~git20120403%252Bdfsg1-2"
                }
            ],
            "aliases": [
                "CVE-2011-4862"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=api",
            "vulnerability_id": "VCID-ws2g-8ye2-pkdk",
            "summary": "samba: Null pointer dereference on missing sname in TGS-REQ",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86538",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86618",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86613",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86548",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86568",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86586",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86596",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8661",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86607",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080",
                    "reference_id": "2013080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586",
                    "reference_id": "996586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2418",
                    "reference_id": "AVG-2418",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2418"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050471?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2021-3671"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62434?format=api",
            "vulnerability_id": "VCID-jfb1-3vg4-vbap",
            "summary": "Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
                },
                {
                    "reference_url": "http://osvdb.org/64744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/64744"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83073",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82969",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82985",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82998",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8302",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83027",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8307",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39762"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39784"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39799"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39818"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39849"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40346"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40685"
                },
                {
                    "reference_url": "http://secunia.com/advisories/41967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/41967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42432",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42432"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42974"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43335"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44954",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44954"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450"
                },
                {
                    "reference_url": "http://support.avaya.com/css/P8/documents/100114315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/css/P8/documents/100114315"
                },
                {
                    "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2052"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/40235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/40235"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-940-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-940-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-940-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-940-2"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1177"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1192"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1193"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1196"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1222"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1574"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1882"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3112"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0134"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261",
                    "reference_id": "582261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466",
                    "reference_id": "582466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321",
                    "reference_id": "CVE-2010-1321",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-13",
                    "reference_id": "GLSA-201201-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0423",
                    "reference_id": "RHSA-2010:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0873",
                    "reference_id": "RHSA-2010:0873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0873"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0935",
                    "reference_id": "RHSA-2010:0935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0935"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0152",
                    "reference_id": "RHSA-2011:0152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0152"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/940-1/",
                    "reference_id": "USN-940-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/940-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/940-2/",
                    "reference_id": "USN-940-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/940-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036800?format=api",
                    "purl": "pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%2Bsqueeze1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-21hz-xvek-73cd"
                        },
                        {
                            "vulnerability": "VCID-3du2-evy8-jfa1"
                        },
                        {
                            "vulnerability": "VCID-5tkj-88u2-83ha"
                        },
                        {
                            "vulnerability": "VCID-81xv-v927-8fdz"
                        },
                        {
                            "vulnerability": "VCID-bc1t-hzu5-bffd"
                        },
                        {
                            "vulnerability": "VCID-ezmy-qjh7-6ycj"
                        },
                        {
                            "vulnerability": "VCID-frnd-3wwy-93ek"
                        },
                        {
                            "vulnerability": "VCID-jhcx-pb5e-8kev"
                        },
                        {
                            "vulnerability": "VCID-r49y-kqyv-pkbq"
                        },
                        {
                            "vulnerability": "VCID-rfpr-mdg9-3uaa"
                        },
                        {
                            "vulnerability": "VCID-s2ne-rcp3-nbgz"
                        },
                        {
                            "vulnerability": "VCID-tcbv-cguk-hfg2"
                        },
                        {
                            "vulnerability": "VCID-unvx-tsxw-abbw"
                        },
                        {
                            "vulnerability": "VCID-ws2g-8ye2-pkdk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%252Bsqueeze1"
                }
            ],
            "aliases": [
                "CVE-2010-1321"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap"
        }
    ],
    "risk_score": "4.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100726.dfsg.1-2%252Bsqueeze1"
}