Lookup for vulnerable packages by Package URL.

GET /api/packages/1050169?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api",
    "purl": "pkg:deb/debian/glibc@2.31-11",
    "type": "deb",
    "namespace": "debian",
    "name": "glibc",
    "version": "2.31-11",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.36-8",
    "latest_non_vulnerable_version": "2.42-15",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62168?format=api",
            "vulnerability_id": "VCID-2gmq-64e3-c7db",
            "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59469",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5946",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65815",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66934",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66886",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66885",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66967",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66912",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013",
                    "reference_id": "2042013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042013"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-24",
                    "reference_id": "GLSA-202208-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202208-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896",
                    "reference_id": "RHSA-2022:0896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0896"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768",
                    "reference_id": "show_bug.cgi?id=28768",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28768"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-1/",
                    "reference_id": "USN-5310-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-2/",
                    "reference_id": "USN-5310-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-23218"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=api",
            "vulnerability_id": "VCID-3hqs-jns2-puf2",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70102",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70116",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70094",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70157",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7018",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70165",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70196",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75216",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202",
                    "reference_id": "2277202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005",
                    "reference_id": "GLIBC-SA-2024-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0011/",
                    "reference_id": "ntap-20240524-0011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0011/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33599"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=api",
            "vulnerability_id": "VCID-6qa1-upks-g3dm",
            "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74883",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74806",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74808",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74841",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74879",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74858",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74885",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74892",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3999"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637",
                    "reference_id": "2024637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024637"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/24/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/01/24/4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1621",
                    "reference_id": "AVG-1621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1621"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3999",
                    "reference_id": "CVE-2021-3999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2021-3999"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2021-3999",
                    "reference_id": "CVE-2021-3999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2021-3999"
                },
                {
                    "reference_url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e",
                    "reference_id": "gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-24",
                    "reference_id": "GLSA-202208-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-24"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221104-0001/",
                    "reference_id": "ntap-20221104-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221104-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896",
                    "reference_id": "RHSA-2022:0896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0896"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769",
                    "reference_id": "show_bug.cgi?id=28769",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28769"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-1/",
                    "reference_id": "USN-5310-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-2/",
                    "reference_id": "USN-5310-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6762-1/",
                    "reference_id": "USN-6762-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6762-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050173?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u5"
                }
            ],
            "aliases": [
                "CVE-2021-3999"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=api",
            "vulnerability_id": "VCID-8p27-z2tz-4bbm",
            "summary": "Multiple vulnerabilities in glibc could result in Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30847",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30818",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30852",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30973",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3102",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30838",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30897",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30927",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30929",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30887",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30842",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33574"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408",
                    "reference_id": "1965408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965408"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147",
                    "reference_id": "989147",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1621",
                    "reference_id": "AVG-1621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1621"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-07",
                    "reference_id": "GLSA-202107-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358",
                    "reference_id": "RHSA-2021:4358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4358"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2021-33574"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=api",
            "vulnerability_id": "VCID-bcuy-bbxf-x7hy",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45185",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4524",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45261",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45229",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45231",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45282",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45276",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54576",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204",
                    "reference_id": "2277204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006",
                    "reference_id": "GLIBC-SA-2024-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0013/",
                    "reference_id": "ntap-20240524-0013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0013/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33600"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=api",
            "vulnerability_id": "VCID-bsue-bznw-1ffe",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28523",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28566",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28367",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28476",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28479",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28387",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28401",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28379",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34852",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205",
                    "reference_id": "2277205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007",
                    "reference_id": "GLIBC-SA-2024-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0014/",
                    "reference_id": "ntap-20240524-0014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0014/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33601"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=api",
            "vulnerability_id": "VCID-d5xx-af6p-2fhn",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13253",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1313",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13218",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13181",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13031",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13033",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13319",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13117",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13198",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13249",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468",
                    "reference_id": "2367468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-04",
                    "reference_id": "GLSA-202509-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-04"
                },
                {
                    "reference_url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e",
                    "reference_id": "?id=1e18586c5820e329f741d5c710275e165581380e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"
                        }
                    ],
                    "url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10219",
                    "reference_id": "RHSA-2025:10219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10219"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10220",
                    "reference_id": "RHSA-2025:10220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10294",
                    "reference_id": "RHSA-2025:10294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11487",
                    "reference_id": "RHSA-2025:11487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8655",
                    "reference_id": "RHSA-2025:8655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8686",
                    "reference_id": "RHSA-2025:8686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8686"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9028",
                    "reference_id": "RHSA-2025:9028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9336",
                    "reference_id": "RHSA-2025:9336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9725",
                    "reference_id": "RHSA-2025:9725",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9725"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9750",
                    "reference_id": "RHSA-2025:9750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9750"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976",
                    "reference_id": "show_bug.cgi?id=32976",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7541-1/",
                    "reference_id": "USN-7541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7541-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api",
                    "purl": "pkg:deb/debian/glibc@2.36-8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8"
                }
            ],
            "aliases": [
                "CVE-2025-4802"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=api",
            "vulnerability_id": "VCID-ge24-a7a4-d3bn",
            "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78075",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78154",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78083",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78128",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78096",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01598",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81723",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01598",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81688",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01598",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81682",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01598",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8172",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975",
                    "reference_id": "1977975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977975"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542",
                    "reference_id": "990542",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1621",
                    "reference_id": "AVG-1621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1621"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-24",
                    "reference_id": "GLSA-202208-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202208-24"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0005/",
                    "reference_id": "ntap-20210827-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210827-0005/"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c",
                    "reference_id": "?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358",
                    "reference_id": "RHSA-2021:4358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4358"
                },
                {
                    "reference_url": "https://sourceware.org/glibc/wiki/Security%20Exceptions",
                    "reference_id": "Security%20Exceptions",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"
                        }
                    ],
                    "url": "https://sourceware.org/glibc/wiki/Security%20Exceptions"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011",
                    "reference_id": "show_bug.cgi?id=28011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=28011"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-1/",
                    "reference_id": "USN-5310-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5699-1/",
                    "reference_id": "USN-5699-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5699-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050170?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2gmq-64e3-c7db"
                        },
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-8p27-z2tz-4bbm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-nk5x-uhcf-7kan"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-wp18-zqr6-a3ag"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13"
                }
            ],
            "aliases": [
                "CVE-2021-35942"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=api",
            "vulnerability_id": "VCID-gv4u-g36a-w3cf",
            "summary": "Multiple vulnerabilities in glibc could result in Local Privilege Escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.59128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9822",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.59128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98223",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.67392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98574",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.72535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98763",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.72771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98771",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98844",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9884",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98837",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98839",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98845",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352",
                    "reference_id": "2238352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                },
                {
                    "reference_url": "https://www.qualys.com/cve-2023-4911/",
                    "reference_id": "cve-2023-4911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://www.qualys.com/cve-2023-4911/"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4911",
                    "reference_id": "CVE-2023-4911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-4911"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt",
                    "reference_id": "CVE-2023-4911",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-03",
                    "reference_id": "GLSA-202310-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-03"
                },
                {
                    "reference_url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
                    "reference_id": "looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5453",
                    "reference_id": "RHSA-2023:5453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5453"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5454",
                    "reference_id": "RHSA-2023:5454",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5454"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5455",
                    "reference_id": "RHSA-2023:5455",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5476",
                    "reference_id": "RHSA-2023:5476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0033",
                    "reference_id": "RHSA-2024:0033",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0033"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6409-1/",
                    "reference_id": "USN-6409-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6409-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2023-4911"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=api",
            "vulnerability_id": "VCID-nk5x-uhcf-7kan",
            "summary": "glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69399",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69418",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69299",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69311",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69329",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69359",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69376",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69398",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69383",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69369",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69407",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43396"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652",
                    "reference_id": "2020652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020652"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622",
                    "reference_id": "998622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1621",
                    "reference_id": "AVG-1621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1621"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2021-43396"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=api",
            "vulnerability_id": "VCID-sjav-8bub-eycz",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.91755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99689",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99712",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99707",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99709",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.92578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99739",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191",
                    "reference_id": "1069191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/24/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404",
                    "reference_id": "2273404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/18/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/17/9",
                    "reference_id": "9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/",
                    "reference_id": "BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004",
                    "reference_id": "GLIBC-SA-2024-0004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html",
                    "reference_id": "msg00001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0002/",
                    "reference_id": "ntap-20240531-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240531-0002/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/",
                    "reference_id": "P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2722",
                    "reference_id": "RHSA-2024:2722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3269",
                    "reference_id": "RHSA-2024:3269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7590",
                    "reference_id": "RHSA-2024:7590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7594",
                    "reference_id": "RHSA-2024:7594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7599",
                    "reference_id": "RHSA-2024:7599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7599"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7939",
                    "reference_id": "RHSA-2024:7939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7939"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8235",
                    "reference_id": "RHSA-2024:8235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8235"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6737-1/",
                    "reference_id": "USN-6737-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6737-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6737-2/",
                    "reference_id": "USN-6737-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6737-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6762-1/",
                    "reference_id": "USN-6762-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6762-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/",
                    "reference_id": "YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-2961"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62169?format=api",
            "vulnerability_id": "VCID-wp18-zqr6-a3ag",
            "summary": "Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59469",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5946",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65815",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00496",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65785",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66934",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66886",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66885",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66947",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66967",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66912",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23219"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017",
                    "reference_id": "2042017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042017"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-24",
                    "reference_id": "GLSA-202208-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202208-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0896",
                    "reference_id": "RHSA-2022:0896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0896"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542",
                    "reference_id": "show_bug.cgi?id=22542",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=22542"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-1/",
                    "reference_id": "USN-5310-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-2/",
                    "reference_id": "USN-5310-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050172?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"
                }
            ],
            "aliases": [
                "CVE-2022-23219"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=api",
            "vulnerability_id": "VCID-xhcm-t8jb-ybfb",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63592",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63644",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63661",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63676",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63627",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63673",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70258",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206",
                    "reference_id": "2277206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008",
                    "reference_id": "GLIBC-SA-2024-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0012/",
                    "reference_id": "ntap-20240524-0012",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0012/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33602"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=api",
            "vulnerability_id": "VCID-ys5d-7xgp-w7g5",
            "summary": "A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21846",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21685",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21899",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21798",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21808",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21768",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21718",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html",
                    "reference_id": "000044.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460",
                    "reference_id": "2339460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2025/01/22/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2025/01/22/4"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001",
                    "reference_id": "GLIBC-SA-2025-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-06",
                    "reference_id": "GLSA-202505-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3828",
                    "reference_id": "RHSA-2025:3828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4241",
                    "reference_id": "RHSA-2025:4241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4242",
                    "reference_id": "RHSA-2025:4242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4243",
                    "reference_id": "RHSA-2025:4243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4244",
                    "reference_id": "RHSA-2025:4244",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4244"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582",
                    "reference_id": "show_bug.cgi?id=32582",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7259-1/",
                    "reference_id": "USN-7259-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7259-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7259-2/",
                    "reference_id": "USN-7259-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7259-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7259-3/",
                    "reference_id": "USN-7259-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7259-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api",
                    "purl": "pkg:deb/debian/glibc@2.36-8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8"
                }
            ],
            "aliases": [
                "CVE-2025-0395"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43779?format=api",
            "vulnerability_id": "VCID-dqgn-fdxt-u3cc",
            "summary": "Multiple vulnerabilities in glibc could result in Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38447",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38471",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38545",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38548",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38501",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38527",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38565",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38631",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38494",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38554",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3326"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916",
                    "reference_id": "1921916",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921916"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/01/28/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/01/28/2"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198",
                    "reference_id": "981198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-16",
                    "reference_id": "ASA-202102-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-17",
                    "reference_id": "ASA-202102-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1320",
                    "reference_id": "AVG-1320",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1320"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-07",
                    "reference_id": "GLSA-202107-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-07"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210304-0007/",
                    "reference_id": "ntap-20210304-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210304-0007/"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888",
                    "reference_id": "?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1585",
                    "reference_id": "RHSA-2021:1585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1585"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256",
                    "reference_id": "show_bug.cgi?id=27256",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27256"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-1/",
                    "reference_id": "USN-5310-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5699-1/",
                    "reference_id": "USN-5699-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5699-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2gmq-64e3-c7db"
                        },
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-8p27-z2tz-4bbm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-ge24-a7a4-d3bn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-nk5x-uhcf-7kan"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-wp18-zqr6-a3ag"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11"
                }
            ],
            "aliases": [
                "CVE-2021-3326"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=api",
            "vulnerability_id": "VCID-zqx5-4rdk-1qa3",
            "summary": "Multiple vulnerabilities in glibc could result in Denial of\n    Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11077",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11189",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1122",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11096",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11242",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11048",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11057",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27645"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589",
                    "reference_id": "1932589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932589"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/",
                    "reference_id": "7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479",
                    "reference_id": "983479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1621",
                    "reference_id": "AVG-1621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1621"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-07",
                    "reference_id": "GLSA-202107-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-07"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/",
                    "reference_id": "I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4358",
                    "reference_id": "RHSA-2021:4358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4358"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462",
                    "reference_id": "show_bug.cgi?id=27462",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27462"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5310-1/",
                    "reference_id": "USN-5310-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5310-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050169?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2gmq-64e3-c7db"
                        },
                        {
                            "vulnerability": "VCID-3hqs-jns2-puf2"
                        },
                        {
                            "vulnerability": "VCID-6qa1-upks-g3dm"
                        },
                        {
                            "vulnerability": "VCID-8p27-z2tz-4bbm"
                        },
                        {
                            "vulnerability": "VCID-bcuy-bbxf-x7hy"
                        },
                        {
                            "vulnerability": "VCID-bsue-bznw-1ffe"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-ge24-a7a4-d3bn"
                        },
                        {
                            "vulnerability": "VCID-gv4u-g36a-w3cf"
                        },
                        {
                            "vulnerability": "VCID-nk5x-uhcf-7kan"
                        },
                        {
                            "vulnerability": "VCID-sjav-8bub-eycz"
                        },
                        {
                            "vulnerability": "VCID-wp18-zqr6-a3ag"
                        },
                        {
                            "vulnerability": "VCID-xhcm-t8jb-ybfb"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11"
                }
            ],
            "aliases": [
                "CVE-2021-27645"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3"
        }
    ],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11"
}