Lookup for vulnerable packages by Package URL.

GET /api/packages/1050174?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1050174?format=api",
    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u6",
    "type": "deb",
    "namespace": "debian",
    "name": "glibc",
    "version": "2.31-13+deb11u6",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.36-8",
    "latest_non_vulnerable_version": "2.42-15",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=api",
            "vulnerability_id": "VCID-3hqs-jns2-puf2",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70116",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70102",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70094",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70141",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70157",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7018",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70165",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70196",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75216",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75253",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202",
                    "reference_id": "2277202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277202"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005",
                    "reference_id": "GLIBC-SA-2024-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0011/",
                    "reference_id": "ntap-20240524-0011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0011/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33599"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=api",
            "vulnerability_id": "VCID-bcuy-bbxf-x7hy",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45185",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4524",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45261",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45229",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45231",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45282",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45276",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54576",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00314",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5454",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204",
                    "reference_id": "2277204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277204"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006",
                    "reference_id": "GLIBC-SA-2024-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0013/",
                    "reference_id": "ntap-20240524-0013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0013/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33600"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=api",
            "vulnerability_id": "VCID-bsue-bznw-1ffe",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28566",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28523",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28367",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28476",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28479",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28387",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28401",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28379",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34852",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00145",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34618",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205",
                    "reference_id": "2277205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277205"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007",
                    "reference_id": "GLIBC-SA-2024-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0014/",
                    "reference_id": "ntap-20240524-0014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0014/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33601"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=api",
            "vulnerability_id": "VCID-d5xx-af6p-2fhn",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13253",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13135",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13181",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13031",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13033",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1313",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13319",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13117",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13198",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13249",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13218",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468",
                    "reference_id": "2367468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2367468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-04",
                    "reference_id": "GLSA-202509-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-04"
                },
                {
                    "reference_url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e",
                    "reference_id": "?id=1e18586c5820e329f741d5c710275e165581380e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"
                        }
                    ],
                    "url": "https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10219",
                    "reference_id": "RHSA-2025:10219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10219"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10220",
                    "reference_id": "RHSA-2025:10220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:10294",
                    "reference_id": "RHSA-2025:10294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:10294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:11487",
                    "reference_id": "RHSA-2025:11487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:11487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8655",
                    "reference_id": "RHSA-2025:8655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:8686",
                    "reference_id": "RHSA-2025:8686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:8686"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9028",
                    "reference_id": "RHSA-2025:9028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9336",
                    "reference_id": "RHSA-2025:9336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9725",
                    "reference_id": "RHSA-2025:9725",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9725"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:9750",
                    "reference_id": "RHSA-2025:9750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:9750"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976",
                    "reference_id": "show_bug.cgi?id=32976",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32976"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7541-1/",
                    "reference_id": "USN-7541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7541-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api",
                    "purl": "pkg:deb/debian/glibc@2.36-8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8"
                }
            ],
            "aliases": [
                "CVE-2025-4802"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=api",
            "vulnerability_id": "VCID-gv4u-g36a-w3cf",
            "summary": "Multiple vulnerabilities in glibc could result in Local Privilege Escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.59128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9822",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.59128",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98223",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.67392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98577",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.67392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98574",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.72535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98763",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.72771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98771",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98844",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9884",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98839",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98845",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.74256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98837",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352",
                    "reference_id": "2238352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238352"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::appstream",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:9.0::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:9.0::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_id": "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"
                },
                {
                    "reference_url": "https://www.qualys.com/cve-2023-4911/",
                    "reference_id": "cve-2023-4911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://www.qualys.com/cve-2023-4911/"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4911",
                    "reference_id": "CVE-2023-4911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-4911"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt",
                    "reference_id": "CVE-2023-4911",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-03",
                    "reference_id": "GLSA-202310-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-03"
                },
                {
                    "reference_url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
                    "reference_id": "looney-tunables-local-privilege-escalation-glibc-ld-so.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5453",
                    "reference_id": "RHSA-2023:5453",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5453"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5454",
                    "reference_id": "RHSA-2023:5454",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5454"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5455",
                    "reference_id": "RHSA-2023:5455",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5476",
                    "reference_id": "RHSA-2023:5476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0033",
                    "reference_id": "RHSA-2024:0033",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0033"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6409-1/",
                    "reference_id": "USN-6409-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6409-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2023-4911"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=api",
            "vulnerability_id": "VCID-sjav-8bub-eycz",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.91755",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99689",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.91924",
                            "scoring_system": "epss",
                            "scoring_elements": "0.997",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9971",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99707",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99709",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.92156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99712",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.92578",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99739",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2961"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191",
                    "reference_id": "1069191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/24/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/04/24/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404",
                    "reference_id": "2273404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273404"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/18/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/04/18/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/27/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/27/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/17/9",
                    "reference_id": "9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/04/17/9"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/",
                    "reference_id": "BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004",
                    "reference_id": "GLIBC-SA-2024-0004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html",
                    "reference_id": "msg00001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0002/",
                    "reference_id": "ntap-20240531-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240531-0002/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/",
                    "reference_id": "P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2722",
                    "reference_id": "RHSA-2024:2722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3269",
                    "reference_id": "RHSA-2024:3269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7590",
                    "reference_id": "RHSA-2024:7590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7594",
                    "reference_id": "RHSA-2024:7594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7599",
                    "reference_id": "RHSA-2024:7599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7599"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7939",
                    "reference_id": "RHSA-2024:7939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7939"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8235",
                    "reference_id": "RHSA-2024:8235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8235"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6737-1/",
                    "reference_id": "USN-6737-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6737-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6737-2/",
                    "reference_id": "USN-6737-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6737-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6762-1/",
                    "reference_id": "USN-6762-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6762-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/",
                    "reference_id": "YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-2961"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=api",
            "vulnerability_id": "VCID-xhcm-t8jb-ybfb",
            "summary": "Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63592",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63644",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63661",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63676",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63627",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63673",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70258",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00627",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70311",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-33602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206",
                    "reference_id": "2277206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2277206"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/22/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/22/5"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008",
                    "reference_id": "GLIBC-SA-2024-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-17",
                    "reference_id": "GLSA-202405-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-17"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0012/",
                    "reference_id": "ntap-20240524-0012",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0012/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2799",
                    "reference_id": "RHSA-2024:2799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2799"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3309",
                    "reference_id": "RHSA-2024:3309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3312",
                    "reference_id": "RHSA-2024:3312",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3312"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3339",
                    "reference_id": "RHSA-2024:3339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3344",
                    "reference_id": "RHSA-2024:3344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3411",
                    "reference_id": "RHSA-2024:3411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3411"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3423",
                    "reference_id": "RHSA-2024:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3464",
                    "reference_id": "RHSA-2024:3464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3588",
                    "reference_id": "RHSA-2024:3588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4126",
                    "reference_id": "RHSA-2024:4126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4126"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6804-1/",
                    "reference_id": "USN-6804-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6804-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995125?format=api",
                    "purl": "pkg:deb/debian/glibc@2.31-13%2Bdeb11u11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3e43-r92j-hkd3"
                        },
                        {
                            "vulnerability": "VCID-9nqp-tfvr-ayen"
                        },
                        {
                            "vulnerability": "VCID-d5xx-af6p-2fhn"
                        },
                        {
                            "vulnerability": "VCID-jswq-6ru6-wybc"
                        },
                        {
                            "vulnerability": "VCID-kukb-s61t-pbc3"
                        },
                        {
                            "vulnerability": "VCID-nwfb-xnks-1kg7"
                        },
                        {
                            "vulnerability": "VCID-ssnc-wdcf-sfc9"
                        },
                        {
                            "vulnerability": "VCID-tcpv-4crc-zuap"
                        },
                        {
                            "vulnerability": "VCID-us68-psx5-zude"
                        },
                        {
                            "vulnerability": "VCID-ys5d-7xgp-w7g5"
                        },
                        {
                            "vulnerability": "VCID-zn6t-3mvb-wufm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"
                }
            ],
            "aliases": [
                "CVE-2024-33602"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=api",
            "vulnerability_id": "VCID-ys5d-7xgp-w7g5",
            "summary": "A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21846",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21685",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21718",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21768",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21808",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21798",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21899",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21955",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0395"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html",
                    "reference_id": "000044.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://sourceware.org/pipermail/libc-announce/2025/000044.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460",
                    "reference_id": "2339460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339460"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2025/01/22/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2025/01/22/4"
                },
                {
                    "reference_url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001",
                    "reference_id": "GLIBC-SA-2025-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-06",
                    "reference_id": "GLSA-202505-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3828",
                    "reference_id": "RHSA-2025:3828",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4241",
                    "reference_id": "RHSA-2025:4241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4242",
                    "reference_id": "RHSA-2025:4242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4243",
                    "reference_id": "RHSA-2025:4243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4244",
                    "reference_id": "RHSA-2025:4244",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4244"
                },
                {
                    "reference_url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582",
                    "reference_id": "show_bug.cgi?id=32582",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"
                        }
                    ],
                    "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7259-1/",
                    "reference_id": "USN-7259-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7259-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7259-2/",
                    "reference_id": "USN-7259-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7259-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7259-3/",
                    "reference_id": "USN-7259-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7259-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995126?format=api",
                    "purl": "pkg:deb/debian/glibc@2.36-8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8"
                }
            ],
            "aliases": [
                "CVE-2025-0395"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u6"
}