Lookup for vulnerable packages by Package URL.

GET /api/packages/582765?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
    "type": "deb",
    "namespace": "debian",
    "name": "bind9",
    "version": "1:9.16.50-1~deb11u2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1:9.18.47-1~deb12u1",
    "latest_non_vulnerable_version": "1:9.18.47-1~deb12u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66829?format=api",
            "vulnerability_id": "VCID-2s8x-my3p-c7bd",
            "summary": "bind: Cache poisoning due to weak PRNG",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06472",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06559",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06582",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06576",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06568",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.065",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06491",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06541",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40780"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405829",
                    "reference_id": "2405829",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405829"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2025-40780",
                    "reference_id": "cve-2025-40780",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:27:36Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2025-40780"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19793",
                    "reference_id": "RHSA-2025:19793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19793"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19912",
                    "reference_id": "RHSA-2025:19912",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19912"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19950",
                    "reference_id": "RHSA-2025:19950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19950"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19951",
                    "reference_id": "RHSA-2025:19951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21034",
                    "reference_id": "RHSA-2025:21034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21034"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21110",
                    "reference_id": "RHSA-2025:21110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21111",
                    "reference_id": "RHSA-2025:21111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21111"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21817",
                    "reference_id": "RHSA-2025:21817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21817"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21887",
                    "reference_id": "RHSA-2025:21887",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21887"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21889",
                    "reference_id": "RHSA-2025:21889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21939",
                    "reference_id": "RHSA-2025:21939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21939"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994",
                    "reference_id": "RHSA-2025:21994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21994"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22168",
                    "reference_id": "RHSA-2025:22168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22168"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0326",
                    "reference_id": "RHSA-2026:0326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0326"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332",
                    "reference_id": "RHSA-2026:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420",
                    "reference_id": "RHSA-2026:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0420"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674",
                    "reference_id": "RHSA-2026:0674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0674"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0677",
                    "reference_id": "RHSA-2026:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702",
                    "reference_id": "RHSA-2026:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0996",
                    "reference_id": "RHSA-2026:0996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0996"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1541",
                    "reference_id": "RHSA-2026:1541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1541"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7836-1/",
                    "reference_id": "USN-7836-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7836-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7836-2/",
                    "reference_id": "USN-7836-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7836-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2025-40780"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2s8x-my3p-c7bd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66828?format=api",
            "vulnerability_id": "VCID-7swx-af28-yqaw",
            "summary": "bind: Cache poisoning attacks with unsolicited RRs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00243",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00235",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00238",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00236",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "5e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00241",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40778"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405827",
                    "reference_id": "2405827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405827"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2025-40778",
                    "reference_id": "cve-2025-40778",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-07T04:56:12Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2025-40778"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19793",
                    "reference_id": "RHSA-2025:19793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19793"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19835",
                    "reference_id": "RHSA-2025:19835",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19835"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19912",
                    "reference_id": "RHSA-2025:19912",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19912"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19950",
                    "reference_id": "RHSA-2025:19950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19950"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19951",
                    "reference_id": "RHSA-2025:19951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21034",
                    "reference_id": "RHSA-2025:21034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21034"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21110",
                    "reference_id": "RHSA-2025:21110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21111",
                    "reference_id": "RHSA-2025:21111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21111"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21735",
                    "reference_id": "RHSA-2025:21735",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21735"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21736",
                    "reference_id": "RHSA-2025:21736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21740",
                    "reference_id": "RHSA-2025:21740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21741",
                    "reference_id": "RHSA-2025:21741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21817",
                    "reference_id": "RHSA-2025:21817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21817"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21887",
                    "reference_id": "RHSA-2025:21887",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21887"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21889",
                    "reference_id": "RHSA-2025:21889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21939",
                    "reference_id": "RHSA-2025:21939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21939"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994",
                    "reference_id": "RHSA-2025:21994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21994"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22168",
                    "reference_id": "RHSA-2025:22168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22168"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22205",
                    "reference_id": "RHSA-2025:22205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23414",
                    "reference_id": "RHSA-2025:23414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23414"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0326",
                    "reference_id": "RHSA-2026:0326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0326"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332",
                    "reference_id": "RHSA-2026:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420",
                    "reference_id": "RHSA-2026:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0420"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674",
                    "reference_id": "RHSA-2026:0674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0674"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0677",
                    "reference_id": "RHSA-2026:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702",
                    "reference_id": "RHSA-2026:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0934",
                    "reference_id": "RHSA-2026:0934",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0934"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0996",
                    "reference_id": "RHSA-2026:0996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0996"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1541",
                    "reference_id": "RHSA-2026:1541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1541"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7836-1/",
                    "reference_id": "USN-7836-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7836-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7836-2/",
                    "reference_id": "USN-7836-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7836-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2025-40778"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7swx-af28-yqaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66830?format=api",
            "vulnerability_id": "VCID-auju-9h98-xkd1",
            "summary": "bind: Resource exhaustion via malformed DNSKEY handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19421",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24392",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24479",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24494",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2445",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24588",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24366",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24435",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-8677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405830",
                    "reference_id": "2405830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2405830"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2025-8677",
                    "reference_id": "cve-2025-8677",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-22T17:29:14Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2025-8677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19912",
                    "reference_id": "RHSA-2025:19912",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19912"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:19950",
                    "reference_id": "RHSA-2025:19950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:19950"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21034",
                    "reference_id": "RHSA-2025:21034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21034"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21111",
                    "reference_id": "RHSA-2025:21111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21111"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994",
                    "reference_id": "RHSA-2025:21994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21994"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0326",
                    "reference_id": "RHSA-2026:0326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0326"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332",
                    "reference_id": "RHSA-2026:0332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420",
                    "reference_id": "RHSA-2026:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0420"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674",
                    "reference_id": "RHSA-2026:0674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0674"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0677",
                    "reference_id": "RHSA-2026:0677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702",
                    "reference_id": "RHSA-2026:0702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:0996",
                    "reference_id": "RHSA-2026:0996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:0996"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1541",
                    "reference_id": "RHSA-2026:1541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1541"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7836-1/",
                    "reference_id": "USN-7836-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7836-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7836-2/",
                    "reference_id": "USN-7836-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7836-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2025-8677"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-auju-9h98-xkd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68619?format=api",
            "vulnerability_id": "VCID-d9np-47r3-rkg1",
            "summary": "bind: bind assertion failure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40777.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40777.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04185",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04222",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06265",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00023",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06306",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07234",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07224",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07247",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-40777"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40777"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381418",
                    "reference_id": "2381418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2381418"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2025-40777",
                    "reference_id": "cve-2025-40777",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-18T14:25:41Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2025-40777"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7641-1/",
                    "reference_id": "USN-7641-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7641-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585522?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.47-1~deb12u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.47-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2025-40777"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d9np-47r3-rkg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49236?format=api",
            "vulnerability_id": "VCID-gdhz-6yzf-afda",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2881.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2881.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8716",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87174",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87195",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87207",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2881"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128594",
                    "reference_id": "2128594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128594"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-2881",
                    "reference_id": "cve-2022-2881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-2881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:26:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-1/",
                    "reference_id": "USN-5626-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2022-2881"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdhz-6yzf-afda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63996?format=api",
            "vulnerability_id": "VCID-unqt-mcxv-c7fw",
            "summary": "bind: BIND: Denial of Service via maliciously crafted DNSSEC-validated zone",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1519.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1519.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20746",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20636",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20679",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20659",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.206",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20805",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20523",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25811",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1519"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451305",
                    "reference_id": "2451305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2451305"
                },
                {
                    "reference_url": "https://downloads.isc.org/isc/bind9/9.18.47",
                    "reference_id": "9.18.47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/"
                        }
                    ],
                    "url": "https://downloads.isc.org/isc/bind9/9.18.47"
                },
                {
                    "reference_url": "https://downloads.isc.org/isc/bind9/9.20.21",
                    "reference_id": "9.20.21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/"
                        }
                    ],
                    "url": "https://downloads.isc.org/isc/bind9/9.20.21"
                },
                {
                    "reference_url": "https://downloads.isc.org/isc/bind9/9.21.20",
                    "reference_id": "9.21.20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/"
                        }
                    ],
                    "url": "https://downloads.isc.org/isc/bind9/9.21.20"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2026-1519",
                    "reference_id": "cve-2026-1519",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T14:55:33Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2026-1519"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8124-1/",
                    "reference_id": "USN-8124-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8124-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2026-1519"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unqt-mcxv-c7fw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71941?format=api",
            "vulnerability_id": "VCID-xz18-c263-nyap",
            "summary": "bind: bind9: Many records in the additional section cause CPU exhaustion",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11187.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11187.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88542",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8855",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88495",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88515",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735",
                    "reference_id": "1094735",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094735"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342879",
                    "reference_id": "2342879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342879"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2024-11187",
                    "reference_id": "cve-2024-11187",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-30T15:27:46Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2024-11187"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1664",
                    "reference_id": "RHSA-2025:1664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1665",
                    "reference_id": "RHSA-2025:1665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1666",
                    "reference_id": "RHSA-2025:1666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1669",
                    "reference_id": "RHSA-2025:1669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1670",
                    "reference_id": "RHSA-2025:1670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1674",
                    "reference_id": "RHSA-2025:1674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1674"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1675",
                    "reference_id": "RHSA-2025:1675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1676",
                    "reference_id": "RHSA-2025:1676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1678",
                    "reference_id": "RHSA-2025:1678",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1678"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1679",
                    "reference_id": "RHSA-2025:1679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1681",
                    "reference_id": "RHSA-2025:1681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1681"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1684",
                    "reference_id": "RHSA-2025:1684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1685",
                    "reference_id": "RHSA-2025:1685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1685"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1687",
                    "reference_id": "RHSA-2025:1687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1687"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1691",
                    "reference_id": "RHSA-2025:1691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1691"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1718",
                    "reference_id": "RHSA-2025:1718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1718"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1907",
                    "reference_id": "RHSA-2025:1907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1912",
                    "reference_id": "RHSA-2025:1912",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1912"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:2588",
                    "reference_id": "RHSA-2025:2588",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:2588"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:3775",
                    "reference_id": "RHSA-2025:3775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:3775"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7241-1/",
                    "reference_id": "USN-7241-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7241-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582766?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.18.41-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.18.41-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2024-11187"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xz18-c263-nyap"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78326?format=api",
            "vulnerability_id": "VCID-3aue-fwnn-qkhu",
            "summary": "bind: named's configured cache size limit can be significantly exceeded",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2828.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2828.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7513",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75183",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75161",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75172",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00869",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75205",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2828"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216227",
                    "reference_id": "2216227",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216227"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/21/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/06/21/6"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-2828",
                    "reference_id": "cve-2023-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-2828"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5439",
                    "reference_id": "dsa-5439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5439"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230703-0010/",
                    "reference_id": "ntap-20230703-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230703-0010/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4005",
                    "reference_id": "RHSA-2023:4005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4005"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4037",
                    "reference_id": "RHSA-2023:4037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4037"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4099",
                    "reference_id": "RHSA-2023:4099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4100",
                    "reference_id": "RHSA-2023:4100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4101",
                    "reference_id": "RHSA-2023:4101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4102",
                    "reference_id": "RHSA-2023:4102",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4102"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4152",
                    "reference_id": "RHSA-2023:4152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4152"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4153",
                    "reference_id": "RHSA-2023:4153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4154",
                    "reference_id": "RHSA-2023:4154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4154"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4332",
                    "reference_id": "RHSA-2023:4332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4332"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/",
                    "reference_id": "SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/",
                    "reference_id": "U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:36:28Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6183-1/",
                    "reference_id": "USN-6183-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6183-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6183-2/",
                    "reference_id": "USN-6183-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6183-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-2828"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3aue-fwnn-qkhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78327?format=api",
            "vulnerability_id": "VCID-3dmq-y6bw-83cx",
            "summary": "bind: Exceeding the recursive-clients quota may cause named to terminate unexpectedly when stale-answer-client-timeout is set to 0",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2911.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2911.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40897",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40871",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40925",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40853",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40902",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40909",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40926",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40891",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2911"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216228",
                    "reference_id": "2216228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216228"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/06/21/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/06/21/6"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-2911",
                    "reference_id": "cve-2023-2911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-2911"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5439",
                    "reference_id": "dsa-5439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5439"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230703-0010/",
                    "reference_id": "ntap-20230703-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230703-0010/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/",
                    "reference_id": "SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/",
                    "reference_id": "U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-06T18:32:18Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6183-1/",
                    "reference_id": "USN-6183-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6183-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-2911"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3dmq-y6bw-83cx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77742?format=api",
            "vulnerability_id": "VCID-43p8-gtsg-f7ck",
            "summary": "bind9: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5679.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5679.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34696",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34612",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34643",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34675",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34636",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5679"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263909",
                    "reference_id": "2263909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263909"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-5679",
                    "reference_id": "cve-2023-5679",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-5679"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/",
                    "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0002/",
                    "reference_id": "ntap-20240426-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0002/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
                    "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/",
                    "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647",
                    "reference_id": "RHSA-2024:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648",
                    "reference_id": "RHSA-2024:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781",
                    "reference_id": "RHSA-2024:1781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789",
                    "reference_id": "RHSA-2024:1789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800",
                    "reference_id": "RHSA-2024:1800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803",
                    "reference_id": "RHSA-2024:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551",
                    "reference_id": "RHSA-2024:2551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2551"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6633-1/",
                    "reference_id": "USN-6633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6633-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
                    "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:24:41Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-5679"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43p8-gtsg-f7ck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80573?format=api",
            "vulnerability_id": "VCID-4nrz-wm5t-z3g5",
            "summary": "bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96269",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96308",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96301",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96305",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96276",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96284",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96297",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928486",
                    "reference_id": "1928486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928486"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983004",
                    "reference_id": "983004",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983004"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-40",
                    "reference_id": "ASA-202102-40",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-40"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1589",
                    "reference_id": "AVG-1589",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1589"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0669",
                    "reference_id": "RHSA-2021:0669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0670",
                    "reference_id": "RHSA-2021:0670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0671",
                    "reference_id": "RHSA-2021:0671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0672",
                    "reference_id": "RHSA-2021:0672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0672"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0691",
                    "reference_id": "RHSA-2021:0691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0691"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0692",
                    "reference_id": "RHSA-2021:0692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0692"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0693",
                    "reference_id": "RHSA-2021:0693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0694",
                    "reference_id": "RHSA-2021:0694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0727",
                    "reference_id": "RHSA-2021:0727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0727"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0922",
                    "reference_id": "RHSA-2021:0922",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0922"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4737-1/",
                    "reference_id": "USN-4737-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4737-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4737-2/",
                    "reference_id": "USN-4737-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4737-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8625"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nrz-wm5t-z3g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61443?format=api",
            "vulnerability_id": "VCID-5bun-yx8z-qka6",
            "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9227",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92277",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92285",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92297",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92301",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92306",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92307",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92305",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869468",
                    "reference_id": "1869468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-19",
                    "reference_id": "GLSA-202008-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-19"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4468-1/",
                    "reference_id": "USN-4468-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4468-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8620"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bun-yx8z-qka6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61444?format=api",
            "vulnerability_id": "VCID-5mjw-b7k7-h7er",
            "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89531",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89548",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8955",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89566",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89571",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89578",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04879",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89577",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8621"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869471",
                    "reference_id": "1869471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869471"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-19",
                    "reference_id": "GLSA-202008-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-19"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4468-1/",
                    "reference_id": "USN-4468-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4468-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8621"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5mjw-b7k7-h7er"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49239?format=api",
            "vulnerability_id": "VCID-5yaa-23ds-bbby",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38177.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38177.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78572",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78615",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78603",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78585",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7861",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78617",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78641",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78623",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601",
                    "reference_id": "2128601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128601"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/",
                    "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-38177",
                    "reference_id": "cve-2022-38177",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-38177"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5235",
                    "reference_id": "dsa-5235",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5235"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/",
                    "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html",
                    "reference_id": "msg00007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221228-0010/",
                    "reference_id": "ntap-20221228-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221228-0010/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6763",
                    "reference_id": "RHSA-2022:6763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6763"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6764",
                    "reference_id": "RHSA-2022:6764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6764"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6765",
                    "reference_id": "RHSA-2022:6765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6778",
                    "reference_id": "RHSA-2022:6778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6778"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6779",
                    "reference_id": "RHSA-2022:6779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6779"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6780",
                    "reference_id": "RHSA-2022:6780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6780"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6781",
                    "reference_id": "RHSA-2022:6781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8598",
                    "reference_id": "RHSA-2022:8598",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8598"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-1/",
                    "reference_id": "USN-5626-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-2/",
                    "reference_id": "USN-5626-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-2/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/",
                    "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:23:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-38177"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5yaa-23ds-bbby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61411?format=api",
            "vulnerability_id": "VCID-66sa-bc5p-jqde",
            "summary": "Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50387.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50387.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97913",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97912",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97909",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97898",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97906",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97896",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.51989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97914",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html",
                    "reference_id": "017430.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845",
                    "reference_id": "1063845",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852",
                    "reference_id": "1063852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077750",
                    "reference_id": "1077750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077750"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2"
                },
                {
                    "reference_url": "https://www.isc.org/blogs/2024-bind-security-release/",
                    "reference_id": "2024-bind-security-release",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://www.isc.org/blogs/2024-bind-security-release/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263914",
                    "reference_id": "2263914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263914"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/",
                    "reference_id": "6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/",
                    "reference_id": "BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-50387",
                    "reference_id": "cve-2023-50387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-50387"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-50387",
                    "reference_id": "CVE-2023-50387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-50387"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387",
                    "reference_id": "CVE-2023-50387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387"
                },
                {
                    "reference_url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/",
                    "reference_id": "dnssec_vulnerability_internet",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-10",
                    "reference_id": "GLSA-202412-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-10"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/",
                    "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/",
                    "reference_id": "IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/"
                },
                {
                    "reference_url": "https://news.ycombinator.com/item?id=39367411",
                    "reference_id": "item?id=39367411",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://news.ycombinator.com/item?id=39367411"
                },
                {
                    "reference_url": "https://news.ycombinator.com/item?id=39372384",
                    "reference_id": "item?id=39372384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://news.ycombinator.com/item?id=39372384"
                },
                {
                    "reference_url": "https://www.athene-center.de/aktuelles/key-trap",
                    "reference_id": "key-trap",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://www.athene-center.de/aktuelles/key-trap"
                },
                {
                    "reference_url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/",
                    "reference_id": "keytrap-dns-attack-could-disable-large-parts-of-internet-researchers",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240307-0007/",
                    "reference_id": "ntap-20240307-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240307-0007/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
                    "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"
                },
                {
                    "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html",
                    "reference_id": "powerdns-advisory-2024-01.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/",
                    "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0965",
                    "reference_id": "RHSA-2024:0965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0965"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0977",
                    "reference_id": "RHSA-2024:0977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0981",
                    "reference_id": "RHSA-2024:0981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0981"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0982",
                    "reference_id": "RHSA-2024:0982",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0982"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11003",
                    "reference_id": "RHSA-2024:11003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11003"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1334",
                    "reference_id": "RHSA-2024:1334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1335",
                    "reference_id": "RHSA-2024:1335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1522",
                    "reference_id": "RHSA-2024:1522",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1522"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1543",
                    "reference_id": "RHSA-2024:1543",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1543"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1544",
                    "reference_id": "RHSA-2024:1544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1545",
                    "reference_id": "RHSA-2024:1545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647",
                    "reference_id": "RHSA-2024:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648",
                    "reference_id": "RHSA-2024:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781",
                    "reference_id": "RHSA-2024:1781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1782",
                    "reference_id": "RHSA-2024:1782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1782"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789",
                    "reference_id": "RHSA-2024:1789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800",
                    "reference_id": "RHSA-2024:1800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1801",
                    "reference_id": "RHSA-2024:1801",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1801"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803",
                    "reference_id": "RHSA-2024:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1804",
                    "reference_id": "RHSA-2024:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551",
                    "reference_id": "RHSA-2024:2551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2587",
                    "reference_id": "RHSA-2024:2587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2696",
                    "reference_id": "RHSA-2024:2696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720",
                    "reference_id": "RHSA-2024:2720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2721",
                    "reference_id": "RHSA-2024:2721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2821",
                    "reference_id": "RHSA-2024:2821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2890",
                    "reference_id": "RHSA-2024:2890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3271",
                    "reference_id": "RHSA-2024:3271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3741",
                    "reference_id": "RHSA-2024:3741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3877",
                    "reference_id": "RHSA-2024:3877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3929",
                    "reference_id": "RHSA-2024:3929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3929"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039",
                    "reference_id": "RHSA-2025:0039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0039"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823",
                    "reference_id": "show_bug.cgi?id=1219823",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/",
                    "reference_id": "SVYA42BLXUCIDLD35YIJPJSHDIADNYMP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/"
                },
                {
                    "reference_url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf",
                    "reference_id": "Technical_Report_KeyTrap.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/",
                    "reference_id": "TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/"
                },
                {
                    "reference_url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/",
                    "reference_id": "unbound-1.19.1-released",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/",
                    "reference_id": "UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6633-1/",
                    "reference_id": "USN-6633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6633-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6642-1/",
                    "reference_id": "USN-6642-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6642-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6657-1/",
                    "reference_id": "USN-6657-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6657-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6657-2/",
                    "reference_id": "USN-6657-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6657-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6665-1/",
                    "reference_id": "USN-6665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6665-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6723-1/",
                    "reference_id": "USN-6723-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6723-1/"
                },
                {
                    "reference_url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1",
                    "reference_id": "v5.7.1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
                    "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:27:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-50387"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66sa-bc5p-jqde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49233?format=api",
            "vulnerability_id": "VCID-67zf-a3r9-wqcv",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25220.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25220.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28459",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28551",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28509",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29013",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29079",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29153",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29202",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064512",
                    "reference_id": "2064512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064512"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-5",
                    "reference_id": "ASA-202204-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2661",
                    "reference_id": "AVG-2661",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2661"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7643",
                    "reference_id": "RHSA-2022:7643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7790",
                    "reference_id": "RHSA-2022:7790",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8068",
                    "reference_id": "RHSA-2022:8068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8068"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8385",
                    "reference_id": "RHSA-2022:8385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8385"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0402",
                    "reference_id": "RHSA-2023:0402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720",
                    "reference_id": "RHSA-2024:2720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21740",
                    "reference_id": "RHSA-2025:21740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21740"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21741",
                    "reference_id": "RHSA-2025:21741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:21889",
                    "reference_id": "RHSA-2025:21889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:21889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:22168",
                    "reference_id": "RHSA-2025:22168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:22168"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23414",
                    "reference_id": "RHSA-2025:23414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23414"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5332-1/",
                    "reference_id": "USN-5332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5332-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5332-2/",
                    "reference_id": "USN-5332-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5332-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-25220"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-67zf-a3r9-wqcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61445?format=api",
            "vulnerability_id": "VCID-6guk-trum-3bad",
            "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85607",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85619",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85637",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85644",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85675",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8569",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85686",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85682",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869473",
                    "reference_id": "1869473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869473"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-19",
                    "reference_id": "GLSA-202008-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4183",
                    "reference_id": "RHSA-2020:4183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4183"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500",
                    "reference_id": "RHSA-2020:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4992",
                    "reference_id": "RHSA-2020:4992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4992"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5011",
                    "reference_id": "RHSA-2020:5011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5203",
                    "reference_id": "RHSA-2020:5203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4468-1/",
                    "reference_id": "USN-4468-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4468-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4468-2/",
                    "reference_id": "USN-4468-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4468-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8622"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6guk-trum-3bad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80330?format=api",
            "vulnerability_id": "VCID-7kh5-ba54-z3gy",
            "summary": "bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25215.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25215.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25215",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81002",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81066",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81086",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81073",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81011",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81035",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81034",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81068",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25215"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953857",
                    "reference_id": "1953857",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953857"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987742",
                    "reference_id": "987742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987742"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-10",
                    "reference_id": "ASA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1890",
                    "reference_id": "AVG-1890",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1468",
                    "reference_id": "RHSA-2021:1468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1468"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1469",
                    "reference_id": "RHSA-2021:1469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1475",
                    "reference_id": "RHSA-2021:1475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1476",
                    "reference_id": "RHSA-2021:1476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1476"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1477",
                    "reference_id": "RHSA-2021:1477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1478",
                    "reference_id": "RHSA-2021:1478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1479",
                    "reference_id": "RHSA-2021:1479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1479"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1989",
                    "reference_id": "RHSA-2021:1989",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1989"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2024",
                    "reference_id": "RHSA-2021:2024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2024"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2028",
                    "reference_id": "RHSA-2021:2028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2028"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4929-1/",
                    "reference_id": "USN-4929-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4929-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7739-1/",
                    "reference_id": "USN-7739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-25215"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh5-ba54-z3gy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49232?format=api",
            "vulnerability_id": "VCID-8k3p-761z-f3e3",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25219.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25219.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76379",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76394",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76412",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00957",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7644",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77425",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77421",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77445",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25219"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017636",
                    "reference_id": "2017636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017636"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202110-12",
                    "reference_id": "ASA-202110-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202110-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2502",
                    "reference_id": "AVG-2502",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2502"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2092",
                    "reference_id": "RHSA-2022:2092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2092"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5126-1/",
                    "reference_id": "USN-5126-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5126-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5126-2/",
                    "reference_id": "USN-5126-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5126-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-25219"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k3p-761z-f3e3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77740?format=api",
            "vulnerability_id": "VCID-9wd4-6az1-j7fp",
            "summary": "bind9: Parsing large DNS messages may cause excessive CPU load",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4408.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4408.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52746",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52803",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5274",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52791",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52785",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52836",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00295",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52819",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263896",
                    "reference_id": "2263896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263896"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-4408",
                    "reference_id": "cve-2023-4408",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-4408"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/",
                    "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0001/",
                    "reference_id": "ntap-20240426-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0001/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
                    "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/",
                    "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647",
                    "reference_id": "RHSA-2024:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648",
                    "reference_id": "RHSA-2024:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781",
                    "reference_id": "RHSA-2024:1781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1782",
                    "reference_id": "RHSA-2024:1782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1782"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789",
                    "reference_id": "RHSA-2024:1789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800",
                    "reference_id": "RHSA-2024:1800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803",
                    "reference_id": "RHSA-2024:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551",
                    "reference_id": "RHSA-2024:2551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720",
                    "reference_id": "RHSA-2024:2720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2721",
                    "reference_id": "RHSA-2024:2721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2821",
                    "reference_id": "RHSA-2024:2821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2890",
                    "reference_id": "RHSA-2024:2890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3271",
                    "reference_id": "RHSA-2024:3271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3741",
                    "reference_id": "RHSA-2024:3741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039",
                    "reference_id": "RHSA-2025:0039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0039"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6633-1/",
                    "reference_id": "USN-6633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6633-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6642-1/",
                    "reference_id": "USN-6642-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6642-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
                    "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:37:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-4408"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wd4-6az1-j7fp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78076?format=api",
            "vulnerability_id": "VCID-ak5q-p7gh-qbdj",
            "summary": "bind: stack exhaustion in control channel code may lead to DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3341.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3341.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47907",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47935",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47928",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47877",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47929",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47924",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47925",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3341"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052416",
                    "reference_id": "1052416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1052416"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/20/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/20/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239621",
                    "reference_id": "2239621",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239621"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-3341",
                    "reference_id": "cve-2023-3341",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-3341"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5504",
                    "reference_id": "dsa-5504",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5504"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/",
                    "reference_id": "IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPJLLTJCSDJJII7IIZPLTBQNWP7MZH7F/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00021.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231013-0003/",
                    "reference_id": "ntap-20231013-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20231013-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5460",
                    "reference_id": "RHSA-2023:5460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5473",
                    "reference_id": "RHSA-2023:5473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5473"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5474",
                    "reference_id": "RHSA-2023:5474",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5474"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5526",
                    "reference_id": "RHSA-2023:5526",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5526"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5527",
                    "reference_id": "RHSA-2023:5527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5529",
                    "reference_id": "RHSA-2023:5529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5529"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5689",
                    "reference_id": "RHSA-2023:5689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5689"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5690",
                    "reference_id": "RHSA-2023:5690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5690"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5691",
                    "reference_id": "RHSA-2023:5691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5691"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5771",
                    "reference_id": "RHSA-2023:5771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039",
                    "reference_id": "RHSA-2025:0039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0039"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/",
                    "reference_id": "U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U35OARLQCPMVCBBPHWBXY5M6XJLD2TZ5/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6390-1/",
                    "reference_id": "USN-6390-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6390-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6421-1/",
                    "reference_id": "USN-6421-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6421-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/",
                    "reference_id": "VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T16:03:26Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSK5V4W4OHPM3JTJGWAQD6CZW7SFD75B/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-3341"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ak5q-p7gh-qbdj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77741?format=api",
            "vulnerability_id": "VCID-b4tb-tn9e-f3gk",
            "summary": "bind9: Querying RFC 1918 reverse zones may cause an assertion failure when “nxdomain-redirect” is enabled",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5517.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5517.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34696",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34612",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34643",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34675",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34636",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263897",
                    "reference_id": "2263897",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263897"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-5517",
                    "reference_id": "cve-2023-5517",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-5517"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/",
                    "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0006/",
                    "reference_id": "ntap-20240503-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240503-0006/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
                    "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/",
                    "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647",
                    "reference_id": "RHSA-2024:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648",
                    "reference_id": "RHSA-2024:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781",
                    "reference_id": "RHSA-2024:1781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789",
                    "reference_id": "RHSA-2024:1789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800",
                    "reference_id": "RHSA-2024:1800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803",
                    "reference_id": "RHSA-2024:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551",
                    "reference_id": "RHSA-2024:2551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2551"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6633-1/",
                    "reference_id": "USN-6633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6633-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6642-1/",
                    "reference_id": "USN-6642-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6642-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
                    "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-22T13:32:01Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-5517"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b4tb-tn9e-f3gk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79771?format=api",
            "vulnerability_id": "VCID-e5ez-2bba-zke3",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8617.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8617.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.89736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99565",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.89736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99566",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.89827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.92629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.92629",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99746",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836124",
                    "reference_id": "1836124",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836124"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939",
                    "reference_id": "961939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202005-13",
                    "reference_id": "ASA-202005-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202005-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1165",
                    "reference_id": "AVG-1165",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1165"
                },
                {
                    "reference_url": "https://github.com/knqyf263/CVE-2020-8617/blob/92a64e68cf77a5b938e0d9c04524fa6147ccb785/exploit.py",
                    "reference_id": "CVE-2020-8617",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://github.com/knqyf263/CVE-2020-8617/blob/92a64e68cf77a5b938e0d9c04524fa6147ccb785/exploit.py"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/48521.py",
                    "reference_id": "CVE-2020-8617",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/48521.py"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2338",
                    "reference_id": "RHSA-2020:2338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2344",
                    "reference_id": "RHSA-2020:2344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2345",
                    "reference_id": "RHSA-2020:2345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2383",
                    "reference_id": "RHSA-2020:2383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2404",
                    "reference_id": "RHSA-2020:2404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2893",
                    "reference_id": "RHSA-2020:2893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2893"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3378",
                    "reference_id": "RHSA-2020:3378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3378"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3379",
                    "reference_id": "RHSA-2020:3379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3433",
                    "reference_id": "RHSA-2020:3433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3433"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3470",
                    "reference_id": "RHSA-2020:3470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3470"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3471",
                    "reference_id": "RHSA-2020:3471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3475",
                    "reference_id": "RHSA-2020:3475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3475"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4365-1/",
                    "reference_id": "USN-4365-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4365-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4365-2/",
                    "reference_id": "USN-4365-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4365-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037004?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%2Bdeb9u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1wga-mp91-7kdf"
                        },
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-3kvk-745c-tfaf"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-4sf3-myam-p3bp"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5sed-29xc-rud6"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7hgq-t98y-gyf9"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-ddg3-vmpb-cbhs"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-e8xu-cq82-x3bw"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-s9ua-j61v-jbch"
                        },
                        {
                            "vulnerability": "VCID-sna2-5cuy-4fa2"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-tg7b-ra4c-cue1"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-wy6z-uskq-n7cs"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-y8gc-me2s-ubfg"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%252Bdeb9u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8617"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5ez-2bba-zke3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61446?format=api",
            "vulnerability_id": "VCID-emc6-37uv-xub8",
            "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95178",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9519",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95192",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95195",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95203",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95212",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95213",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95216",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869477",
                    "reference_id": "1869477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869477"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-19",
                    "reference_id": "GLSA-202008-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500",
                    "reference_id": "RHSA-2020:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4992",
                    "reference_id": "RHSA-2020:4992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4992"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5011",
                    "reference_id": "RHSA-2020:5011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5203",
                    "reference_id": "RHSA-2020:5203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4468-1/",
                    "reference_id": "USN-4468-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4468-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8623"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-emc6-37uv-xub8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81149?format=api",
            "vulnerability_id": "VCID-gqmy-rkkq-mkgj",
            "summary": "bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79698",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79721",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79704",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79678",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.797",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8618"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847242",
                    "reference_id": "1847242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847242"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202006-13",
                    "reference_id": "ASA-202006-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202006-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1191",
                    "reference_id": "AVG-1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1191"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4399-1/",
                    "reference_id": "USN-4399-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4399-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8618"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqmy-rkkq-mkgj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49240?format=api",
            "vulnerability_id": "VCID-hb26-udtw-6uhy",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38178.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38178.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80545",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80588",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80614",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80601",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38178"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602",
                    "reference_id": "2128602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128602"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2811",
                    "reference_id": "AVG-2811",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/",
                    "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-38178",
                    "reference_id": "cve-2022-38178",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-38178"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5235",
                    "reference_id": "dsa-5235",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5235"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/",
                    "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html",
                    "reference_id": "msg00007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221228-0009/",
                    "reference_id": "ntap-20221228-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221228-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6763",
                    "reference_id": "RHSA-2022:6763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6763"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6764",
                    "reference_id": "RHSA-2022:6764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6764"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6765",
                    "reference_id": "RHSA-2022:6765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6778",
                    "reference_id": "RHSA-2022:6778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6778"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6779",
                    "reference_id": "RHSA-2022:6779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6779"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6780",
                    "reference_id": "RHSA-2022:6780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6780"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6781",
                    "reference_id": "RHSA-2022:6781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8598",
                    "reference_id": "RHSA-2022:8598",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8598"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-1/",
                    "reference_id": "USN-5626-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/",
                    "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:22:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-38178"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hb26-udtw-6uhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74687?format=api",
            "vulnerability_id": "VCID-jh5e-m42g-4bb3",
            "summary": "bind: bind9: Assertion failure when serving both stale cache data and authoritative zone content",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2031",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20518",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20243",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20324",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20411",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20366",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4076"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/23/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:10:37Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:10:37Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/31/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298904",
                    "reference_id": "2298904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298904"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2024-4076",
                    "reference_id": "cve-2024-4076",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T15:10:37Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2024-4076"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5231",
                    "reference_id": "RHSA-2024:5231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5390",
                    "reference_id": "RHSA-2024:5390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5418",
                    "reference_id": "RHSA-2024:5418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5525",
                    "reference_id": "RHSA-2024:5525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5525"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5813",
                    "reference_id": "RHSA-2024:5813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5907",
                    "reference_id": "RHSA-2024:5907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6004",
                    "reference_id": "RHSA-2024:6004",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6004"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6013",
                    "reference_id": "RHSA-2024:6013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6013"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-1/",
                    "reference_id": "USN-6909-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2024-4076"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jh5e-m42g-4bb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78711?format=api",
            "vulnerability_id": "VCID-jp5u-p7cf-43dw",
            "summary": "bind: flooding with UPDATE requests may lead to DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3094.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3094.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80715",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82172",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82168",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82134",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0168",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82161",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164032",
                    "reference_id": "2164032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164032"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-3094",
                    "reference_id": "cve-2022-3094",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:48:11Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-3094"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261",
                    "reference_id": "RHSA-2023:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792",
                    "reference_id": "RHSA-2023:2792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7177",
                    "reference_id": "RHSA-2023:7177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1406",
                    "reference_id": "RHSA-2024:1406",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1406"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720",
                    "reference_id": "RHSA-2024:2720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2720"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5827-1/",
                    "reference_id": "USN-5827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-3094"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jp5u-p7cf-43dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49235?format=api",
            "vulnerability_id": "VCID-kpsw-dq9w-pkdr",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2795.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2795.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65706",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65669",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65665",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65716",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65728",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6575",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65735",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128584",
                    "reference_id": "2128584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128584"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2811",
                    "reference_id": "AVG-2811",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/",
                    "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-2795",
                    "reference_id": "cve-2022-2795",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-2795"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5235",
                    "reference_id": "dsa-5235",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5235"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/",
                    "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html",
                    "reference_id": "msg00007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00007.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0402",
                    "reference_id": "RHSA-2023:0402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261",
                    "reference_id": "RHSA-2023:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792",
                    "reference_id": "RHSA-2023:2792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3002",
                    "reference_id": "RHSA-2023:3002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3002"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720",
                    "reference_id": "RHSA-2024:2720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2720"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-1/",
                    "reference_id": "USN-5626-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-2/",
                    "reference_id": "USN-5626-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-2/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/",
                    "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-12T17:20:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-2795"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kpsw-dq9w-pkdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77743?format=api",
            "vulnerability_id": "VCID-nfr5-81bf-fuc5",
            "summary": "bind9: Specific recursive query patterns may lead to an out-of-memory condition",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6516.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6516.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6516",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39362",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39277",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39332",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39322",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6516"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/13/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/13/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263911",
                    "reference_id": "2263911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263911"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-6516",
                    "reference_id": "cve-2023-6516",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-6516"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0008/",
                    "reference_id": "ntap-20240503-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240503-0008/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
                    "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647",
                    "reference_id": "RHSA-2024:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648",
                    "reference_id": "RHSA-2024:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781",
                    "reference_id": "RHSA-2024:1781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789",
                    "reference_id": "RHSA-2024:1789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800",
                    "reference_id": "RHSA-2024:1800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803",
                    "reference_id": "RHSA-2024:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551",
                    "reference_id": "RHSA-2024:2551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2551"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6642-1/",
                    "reference_id": "USN-6642-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6642-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
                    "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-20T16:01:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-6516"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfr5-81bf-fuc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80329?format=api",
            "vulnerability_id": "VCID-pjk7-r6yh-ufak",
            "summary": "bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25214.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25214.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73117",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73171",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73177",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73127",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73148",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73158",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73172",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953849",
                    "reference_id": "1953849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953849"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987741",
                    "reference_id": "987741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987741"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-10",
                    "reference_id": "ASA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1890",
                    "reference_id": "AVG-1890",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3325",
                    "reference_id": "RHSA-2021:3325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4384",
                    "reference_id": "RHSA-2021:4384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4384"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4929-1/",
                    "reference_id": "USN-4929-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4929-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7739-1/",
                    "reference_id": "USN-7739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-25214"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pjk7-r6yh-ufak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81836?format=api",
            "vulnerability_id": "VCID-qk77-35nr-1qbd",
            "summary": "bind: TCP Pipelining doesn't limit TCP clients on a single connection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90358",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9036",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90376",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90389",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90404",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90403",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90397",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773617",
                    "reference_id": "1773617",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773617"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945171",
                    "reference_id": "945171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1061",
                    "reference_id": "RHSA-2020:1061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1061"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1845",
                    "reference_id": "RHSA-2020:1845",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1845"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4197-1/",
                    "reference_id": "USN-4197-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4197-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2019-6477"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qk77-35nr-1qbd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81150?format=api",
            "vulnerability_id": "VCID-qknq-wu95-6ba7",
            "summary": "bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91367",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91417",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91415",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91418",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91373",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91383",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91403",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91409",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847244",
                    "reference_id": "1847244",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847244"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202006-13",
                    "reference_id": "ASA-202006-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202006-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1191",
                    "reference_id": "AVG-1191",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500",
                    "reference_id": "RHSA-2020:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4399-1/",
                    "reference_id": "USN-4399-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4399-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8619"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qknq-wu95-6ba7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80331?format=api",
            "vulnerability_id": "VCID-rd8n-tcus-zyg3",
            "summary": "bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25216.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25216.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96416",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96443",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96423",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96427",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96431",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.27744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96439",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953872",
                    "reference_id": "1953872",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953872"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987743",
                    "reference_id": "987743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987743"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202104-10",
                    "reference_id": "ASA-202104-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202104-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1890",
                    "reference_id": "AVG-1890",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1890"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4929-1/",
                    "reference_id": "USN-4929-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4929-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7739-1/",
                    "reference_id": "USN-7739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7739-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2021-25216"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rd8n-tcus-zyg3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49238?format=api",
            "vulnerability_id": "VCID-rgz6-urkq-ybch",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3080.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3080.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.292",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29328",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29378",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29254",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29295",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29298",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29252",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3080"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600",
                    "reference_id": "2128600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128600"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/09/21/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/09/21/3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2811",
                    "reference_id": "AVG-2811",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2811"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/",
                    "reference_id": "CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CV4GQWBPF7Y52J2FA24U6UMHQAOXZEF7/"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-3080",
                    "reference_id": "cve-2022-3080",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-3080"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5235",
                    "reference_id": "dsa-5235",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5235"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/",
                    "reference_id": "MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRHB6J4Z7BKH4HPEKG5D35QGRD6ANNMT/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0002/",
                    "reference_id": "ntap-20240621-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240621-0002/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6763",
                    "reference_id": "RHSA-2022:6763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6763"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6781",
                    "reference_id": "RHSA-2022:6781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6781"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5626-1/",
                    "reference_id": "USN-5626-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5626-1/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/",
                    "reference_id": "YZJQNUASODNVAWZV6STKG5SD6XIJ446S",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-26T19:18:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZJQNUASODNVAWZV6STKG5SD6XIJ446S/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-3080"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgz6-urkq-ybch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79770?format=api",
            "vulnerability_id": "VCID-tg21-xnsh-t7c3",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.946",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94615",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94608",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.19393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9537",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.19393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95373",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.19393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95377",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.19393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95363",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.19393",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9538",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836118",
                    "reference_id": "1836118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836118"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939",
                    "reference_id": "961939",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961939"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202005-13",
                    "reference_id": "ASA-202005-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202005-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1165",
                    "reference_id": "AVG-1165",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1165"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2338",
                    "reference_id": "RHSA-2020:2338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2344",
                    "reference_id": "RHSA-2020:2344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2345",
                    "reference_id": "RHSA-2020:2345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2383",
                    "reference_id": "RHSA-2020:2383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2404",
                    "reference_id": "RHSA-2020:2404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3272",
                    "reference_id": "RHSA-2020:3272",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3272"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3378",
                    "reference_id": "RHSA-2020:3378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3378"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3379",
                    "reference_id": "RHSA-2020:3379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3433",
                    "reference_id": "RHSA-2020:3433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3433"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3470",
                    "reference_id": "RHSA-2020:3470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3470"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3471",
                    "reference_id": "RHSA-2020:3471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3475",
                    "reference_id": "RHSA-2020:3475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3475"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4365-1/",
                    "reference_id": "USN-4365-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4365-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4365-2/",
                    "reference_id": "USN-4365-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4365-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037004?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%2Bdeb9u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1wga-mp91-7kdf"
                        },
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-3kvk-745c-tfaf"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-4sf3-myam-p3bp"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5sed-29xc-rud6"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7hgq-t98y-gyf9"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-ddg3-vmpb-cbhs"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-e8xu-cq82-x3bw"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-s9ua-j61v-jbch"
                        },
                        {
                            "vulnerability": "VCID-sna2-5cuy-4fa2"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-tg7b-ra4c-cue1"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-wy6z-uskq-n7cs"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-y8gc-me2s-ubfg"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.10.3.dfsg.P4-12.3%252Bdeb9u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8616"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tg21-xnsh-t7c3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74686?format=api",
            "vulnerability_id": "VCID-ue3u-3a17-8uej",
            "summary": "bind9: bind: SIG(0) can be used to exhaust CPU resources",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1975.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34546",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34641",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34536",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34578",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34608",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3457",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/23/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/31/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298901",
                    "reference_id": "2298901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298901"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2024-1975",
                    "reference_id": "cve-2024-1975",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-23T17:12:04Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2024-1975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5231",
                    "reference_id": "RHSA-2024:5231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5390",
                    "reference_id": "RHSA-2024:5390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5418",
                    "reference_id": "RHSA-2024:5418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5524",
                    "reference_id": "RHSA-2024:5524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5525",
                    "reference_id": "RHSA-2024:5525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5525"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5655",
                    "reference_id": "RHSA-2024:5655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5813",
                    "reference_id": "RHSA-2024:5813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5838",
                    "reference_id": "RHSA-2024:5838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5871",
                    "reference_id": "RHSA-2024:5871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5871"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5894",
                    "reference_id": "RHSA-2024:5894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5907",
                    "reference_id": "RHSA-2024:5907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5908",
                    "reference_id": "RHSA-2024:5908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5908"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5930",
                    "reference_id": "RHSA-2024:5930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5930"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6004",
                    "reference_id": "RHSA-2024:6004",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6004"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6013",
                    "reference_id": "RHSA-2024:6013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6013"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6642",
                    "reference_id": "RHSA-2024:6642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6642"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-1/",
                    "reference_id": "USN-6909-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-2/",
                    "reference_id": "USN-6909-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-3/",
                    "reference_id": "USN-6909-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2024-1975"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ue3u-3a17-8uej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78713?format=api",
            "vulnerability_id": "VCID-vc7v-cqr1-jkcd",
            "summary": "bind: sending specific queries to the resolver may cause a DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3924.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3924.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76516",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76517",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76543",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76522",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76474",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76506",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164039",
                    "reference_id": "2164039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164039"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-3924",
                    "reference_id": "cve-2022-3924",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-31T13:57:22Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-3924"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261",
                    "reference_id": "RHSA-2023:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792",
                    "reference_id": "RHSA-2023:2792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2792"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5827-1/",
                    "reference_id": "USN-5827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-3924"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vc7v-cqr1-jkcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61412?format=api",
            "vulnerability_id": "VCID-vprj-j7u6-zbe7",
            "summary": "Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50868.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50868.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93712",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93708",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93706",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93696",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93684",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93694",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html",
                    "reference_id": "017430.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845",
                    "reference_id": "1063845",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063845"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852",
                    "reference_id": "1063852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063852"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077751",
                    "reference_id": "1077751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077751"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2"
                },
                {
                    "reference_url": "https://www.isc.org/blogs/2024-bind-security-release/",
                    "reference_id": "2024-bind-security-release",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://www.isc.org/blogs/2024-bind-security-release/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263917",
                    "reference_id": "2263917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263917"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/02/16/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/",
                    "reference_id": "6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/",
                    "reference_id": "BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2023-50868",
                    "reference_id": "cve-2023-50868",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2023-50868"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-50868",
                    "reference_id": "CVE-2023-50868",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-50868"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-10",
                    "reference_id": "GLSA-202412-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-10"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/",
                    "reference_id": "HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/",
                    "reference_id": "IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html",
                    "reference_id": "msg00006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240307-0008/",
                    "reference_id": "ntap-20240307-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240307-0008/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/",
                    "reference_id": "PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/"
                },
                {
                    "reference_url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html",
                    "reference_id": "powerdns-advisory-2024-01.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html"
                },
                {
                    "reference_url": "https://datatracker.ietf.org/doc/html/rfc5155",
                    "reference_id": "rfc5155",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://datatracker.ietf.org/doc/html/rfc5155"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/",
                    "reference_id": "RGS7JN6FZXUSTC2XKQHH27574XOULYYJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0965",
                    "reference_id": "RHSA-2024:0965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0965"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0977",
                    "reference_id": "RHSA-2024:0977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0981",
                    "reference_id": "RHSA-2024:0981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0981"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0982",
                    "reference_id": "RHSA-2024:0982",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0982"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11003",
                    "reference_id": "RHSA-2024:11003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11003"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1334",
                    "reference_id": "RHSA-2024:1334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1334"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1335",
                    "reference_id": "RHSA-2024:1335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1522",
                    "reference_id": "RHSA-2024:1522",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1522"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1543",
                    "reference_id": "RHSA-2024:1543",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1543"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1544",
                    "reference_id": "RHSA-2024:1544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1545",
                    "reference_id": "RHSA-2024:1545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1545"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1647",
                    "reference_id": "RHSA-2024:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1648",
                    "reference_id": "RHSA-2024:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1781",
                    "reference_id": "RHSA-2024:1781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1781"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1782",
                    "reference_id": "RHSA-2024:1782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1782"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1789",
                    "reference_id": "RHSA-2024:1789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1800",
                    "reference_id": "RHSA-2024:1800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1801",
                    "reference_id": "RHSA-2024:1801",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1801"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1803",
                    "reference_id": "RHSA-2024:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1804",
                    "reference_id": "RHSA-2024:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2551",
                    "reference_id": "RHSA-2024:2551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2587",
                    "reference_id": "RHSA-2024:2587",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2587"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2696",
                    "reference_id": "RHSA-2024:2696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2720",
                    "reference_id": "RHSA-2024:2720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2721",
                    "reference_id": "RHSA-2024:2721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2821",
                    "reference_id": "RHSA-2024:2821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2890",
                    "reference_id": "RHSA-2024:2890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3271",
                    "reference_id": "RHSA-2024:3271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3741",
                    "reference_id": "RHSA-2024:3741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3741"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3877",
                    "reference_id": "RHSA-2024:3877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3929",
                    "reference_id": "RHSA-2024:3929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3929"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:0039",
                    "reference_id": "RHSA-2025:0039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:0039"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1219826",
                    "reference_id": "show_bug.cgi?id=1219826",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219826"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/",
                    "reference_id": "SVYA42BLXUCIDLD35YIJPJSHDIADNYMP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/",
                    "reference_id": "TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/"
                },
                {
                    "reference_url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/",
                    "reference_id": "unbound-1.19.1-released",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/",
                    "reference_id": "UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6633-1/",
                    "reference_id": "USN-6633-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6633-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6642-1/",
                    "reference_id": "USN-6642-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6642-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6657-1/",
                    "reference_id": "USN-6657-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6657-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6657-2/",
                    "reference_id": "USN-6657-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6657-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6665-1/",
                    "reference_id": "USN-6665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6665-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6723-1/",
                    "reference_id": "USN-6723-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6723-1/"
                },
                {
                    "reference_url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1",
                    "reference_id": "v5.7.1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
                    "reference_id": "ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-19T20:27:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2023-50868"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vprj-j7u6-zbe7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74685?format=api",
            "vulnerability_id": "VCID-xprr-w4d5-m7dt",
            "summary": "bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1737.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1737.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38143",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38233",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38256",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38126",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38203",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00169",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38167",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-1737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/23/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/23/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/31/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298893",
                    "reference_id": "2298893",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298893"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2024-1737",
                    "reference_id": "cve-2024-1737",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2024-1737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5231",
                    "reference_id": "RHSA-2024:5231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5390",
                    "reference_id": "RHSA-2024:5390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5418",
                    "reference_id": "RHSA-2024:5418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5418"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5524",
                    "reference_id": "RHSA-2024:5524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5524"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5525",
                    "reference_id": "RHSA-2024:5525",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5525"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5655",
                    "reference_id": "RHSA-2024:5655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5813",
                    "reference_id": "RHSA-2024:5813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5838",
                    "reference_id": "RHSA-2024:5838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5871",
                    "reference_id": "RHSA-2024:5871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5871"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5894",
                    "reference_id": "RHSA-2024:5894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5907",
                    "reference_id": "RHSA-2024:5907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5908",
                    "reference_id": "RHSA-2024:5908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5908"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5930",
                    "reference_id": "RHSA-2024:5930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5930"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6004",
                    "reference_id": "RHSA-2024:6004",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6004"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6013",
                    "reference_id": "RHSA-2024:6013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6013"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6642",
                    "reference_id": "RHSA-2024:6642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6642"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/rrset-limits-in-zones",
                    "reference_id": "rrset-limits-in-zones",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T17:27:11Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/rrset-limits-in-zones"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-1/",
                    "reference_id": "USN-6909-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-2/",
                    "reference_id": "USN-6909-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6909-3/",
                    "reference_id": "USN-6909-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6909-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2024-1737"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xprr-w4d5-m7dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61447?format=api",
            "vulnerability_id": "VCID-yeqv-d2wz-6ybd",
            "summary": "Multiple vulnerabilities have been found in BIND, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81836",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8187",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81866",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81892",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81918",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81906",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01632",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81901",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869480",
                    "reference_id": "1869480",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1869480"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966497",
                    "reference_id": "966497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966497"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-19",
                    "reference_id": "GLSA-202008-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4500",
                    "reference_id": "RHSA-2020:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5011",
                    "reference_id": "RHSA-2020:5011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5203",
                    "reference_id": "RHSA-2020:5203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4468-1/",
                    "reference_id": "USN-4468-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4468-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037953?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.11.5.P4%2Bdfsg-5.1%2Bdeb10u7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-3aue-fwnn-qkhu"
                        },
                        {
                            "vulnerability": "VCID-3dmq-y6bw-83cx"
                        },
                        {
                            "vulnerability": "VCID-43p8-gtsg-f7ck"
                        },
                        {
                            "vulnerability": "VCID-4nrz-wm5t-z3g5"
                        },
                        {
                            "vulnerability": "VCID-5bun-yx8z-qka6"
                        },
                        {
                            "vulnerability": "VCID-5mjw-b7k7-h7er"
                        },
                        {
                            "vulnerability": "VCID-5yaa-23ds-bbby"
                        },
                        {
                            "vulnerability": "VCID-66sa-bc5p-jqde"
                        },
                        {
                            "vulnerability": "VCID-67zf-a3r9-wqcv"
                        },
                        {
                            "vulnerability": "VCID-6guk-trum-3bad"
                        },
                        {
                            "vulnerability": "VCID-7kh5-ba54-z3gy"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-8k3p-761z-f3e3"
                        },
                        {
                            "vulnerability": "VCID-9wd4-6az1-j7fp"
                        },
                        {
                            "vulnerability": "VCID-ak5q-p7gh-qbdj"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-b4tb-tn9e-f3gk"
                        },
                        {
                            "vulnerability": "VCID-e5ez-2bba-zke3"
                        },
                        {
                            "vulnerability": "VCID-emc6-37uv-xub8"
                        },
                        {
                            "vulnerability": "VCID-gqmy-rkkq-mkgj"
                        },
                        {
                            "vulnerability": "VCID-hb26-udtw-6uhy"
                        },
                        {
                            "vulnerability": "VCID-jh5e-m42g-4bb3"
                        },
                        {
                            "vulnerability": "VCID-jp5u-p7cf-43dw"
                        },
                        {
                            "vulnerability": "VCID-kpsw-dq9w-pkdr"
                        },
                        {
                            "vulnerability": "VCID-nfr5-81bf-fuc5"
                        },
                        {
                            "vulnerability": "VCID-pjk7-r6yh-ufak"
                        },
                        {
                            "vulnerability": "VCID-qk77-35nr-1qbd"
                        },
                        {
                            "vulnerability": "VCID-qknq-wu95-6ba7"
                        },
                        {
                            "vulnerability": "VCID-rd8n-tcus-zyg3"
                        },
                        {
                            "vulnerability": "VCID-rgz6-urkq-ybch"
                        },
                        {
                            "vulnerability": "VCID-tg21-xnsh-t7c3"
                        },
                        {
                            "vulnerability": "VCID-ue3u-3a17-8uej"
                        },
                        {
                            "vulnerability": "VCID-vc7v-cqr1-jkcd"
                        },
                        {
                            "vulnerability": "VCID-vprj-j7u6-zbe7"
                        },
                        {
                            "vulnerability": "VCID-xprr-w4d5-m7dt"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        },
                        {
                            "vulnerability": "VCID-yeqv-d2wz-6ybd"
                        },
                        {
                            "vulnerability": "VCID-z9gk-jg1m-gfg6"
                        },
                        {
                            "vulnerability": "VCID-zgnn-ckqt-43fq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.11.5.P4%252Bdfsg-5.1%252Bdeb10u7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2020-8624"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yeqv-d2wz-6ybd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78712?format=api",
            "vulnerability_id": "VCID-z9gk-jg1m-gfg6",
            "summary": "bind: sending specific queries to the resolver may cause a DoS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3736.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3736.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81656",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81634",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83027",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82996",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8302",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164038",
                    "reference_id": "2164038",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164038"
                },
                {
                    "reference_url": "https://kb.isc.org/docs/cve-2022-3736",
                    "reference_id": "cve-2022-3736",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-01T14:10:30Z/"
                        }
                    ],
                    "url": "https://kb.isc.org/docs/cve-2022-3736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2261",
                    "reference_id": "RHSA-2023:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2792",
                    "reference_id": "RHSA-2023:2792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2792"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5827-1/",
                    "reference_id": "USN-5827-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5827-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-3736"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9gk-jg1m-gfg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49234?format=api",
            "vulnerability_id": "VCID-zgnn-ckqt-43fq",
            "summary": "Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0396.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0396.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28578",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2853",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28623",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28665",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2871",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28516",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28581",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28621",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0396"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064513",
                    "reference_id": "2064513",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064513"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-5",
                    "reference_id": "ASA-202204-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2661",
                    "reference_id": "AVG-2661",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2661"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-25",
                    "reference_id": "GLSA-202210-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7643",
                    "reference_id": "RHSA-2022:7643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8068",
                    "reference_id": "RHSA-2022:8068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8068"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5332-1/",
                    "reference_id": "USN-5332-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5332-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582765?format=api",
                    "purl": "pkg:deb/debian/bind9@1:9.16.50-1~deb11u2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2s8x-my3p-c7bd"
                        },
                        {
                            "vulnerability": "VCID-7swx-af28-yqaw"
                        },
                        {
                            "vulnerability": "VCID-auju-9h98-xkd1"
                        },
                        {
                            "vulnerability": "VCID-d9np-47r3-rkg1"
                        },
                        {
                            "vulnerability": "VCID-gdhz-6yzf-afda"
                        },
                        {
                            "vulnerability": "VCID-unqt-mcxv-c7fw"
                        },
                        {
                            "vulnerability": "VCID-xz18-c263-nyap"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
                }
            ],
            "aliases": [
                "CVE-2022-0396"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnn-ckqt-43fq"
        }
    ],
    "risk_score": "3.9",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bind9@1:9.16.50-1~deb11u2"
}