Lookup for vulnerable packages by Package URL.

GET /api/packages/924869?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "heimdal",
    "version": "7.8.git20221117.28daf24+dfsg-9",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "7.8.git20221117.28daf24+dfsg-11",
    "latest_non_vulnerable_version": "7.8.git20221117.28daf24+dfsg-11",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47961?format=api",
            "vulnerability_id": "VCID-21hz-xvek-73cd",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16860.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83706",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83719",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83734",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83736",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8376",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83777",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83772",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83806",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83807",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83808",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877",
                    "reference_id": "1705877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705877"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966",
                    "reference_id": "928966",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928966"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3976-1/",
                    "reference_id": "USN-3976-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3976-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3976-2/",
                    "reference_id": "USN-3976-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3976-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924883?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16860"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-21hz-xvek-73cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91178?format=api",
            "vulnerability_id": "VCID-2naz-tr19-4ya4",
            "summary": "Heimdal 0.6.x before 0.6.1 and 0.5.x before 0.5.3 does not properly perform certain consistency checks for cross-realm requests, which allows remote attackers with control of a realm to impersonate others in the cross-realm trust path.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75971",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75974",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76006",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75985",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76018",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76033",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76058",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76034",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76029",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7607",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76073",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76057",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0371"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0371"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924872?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.6.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0371"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2naz-tr19-4ya4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47300?format=api",
            "vulnerability_id": "VCID-3du2-evy8-jfa1",
            "summary": "Multiple vulnerabilities have been discovered in MIT krb5, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92245",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92532",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92565",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92558",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92542",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267",
                    "reference_id": "1024267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024267"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960",
                    "reference_id": "2140960",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140960"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/advisories/",
                    "reference_id": "advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/advisories/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-42898.html",
                    "reference_id": "CVE-2022-42898.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-42898.html"
                },
                {
                    "reference_url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_id": "ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c",
                    "reference_id": "GHSA-64mq-fvfj-5x3c",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-11",
                    "reference_id": "GLSA-202405-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-11"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.19/",
                    "reference_id": "krb5-1.19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.19/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230223-0001/",
                    "reference_id": "ntap-20230223-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230223-0001/"
                },
                {
                    "reference_url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt",
                    "reference_id": "README-1.20.1.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8637",
                    "reference_id": "RHSA-2022:8637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8638",
                    "reference_id": "RHSA-2022:8638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8639",
                    "reference_id": "RHSA-2022:8639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8640",
                    "reference_id": "RHSA-2022:8640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8641",
                    "reference_id": "RHSA-2022:8641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8648",
                    "reference_id": "RHSA-2022:8648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8662",
                    "reference_id": "RHSA-2022:8662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8663",
                    "reference_id": "RHSA-2022:8663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8669",
                    "reference_id": "RHSA-2022:8669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9029",
                    "reference_id": "RHSA-2022:9029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9029"
                },
                {
                    "reference_url": "https://bugzilla.samba.org/show_bug.cgi?id=15203",
                    "reference_id": "show_bug.cgi?id=15203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-14T16:11:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5828-1/",
                    "reference_id": "USN-5828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5828-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-42898"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3du2-evy8-jfa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91036?format=api",
            "vulnerability_id": "VCID-49ja-xj3f-yqcr",
            "summary": "Unknown vulnerabilities in Heimdal before 0.5 with unknown impact, possibly in the (1) kadmind and (2) kdc servers, may allow remote or local attackers to gain root or other access, but not via buffer overflows (CVE-2002-1225).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61766",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6184",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6187",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61842",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61928",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61916",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61896",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6194",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61944",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61926",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1226"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1226",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1226"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924866?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.4e-21?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-21%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2002-1226"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-49ja-xj3f-yqcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89723?format=api",
            "vulnerability_id": "VCID-4vzx-hyh9-pubu",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0138.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90313",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90316",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90328",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90332",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90346",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90353",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90354",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90369",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05644",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90367",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0138"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0138"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616981",
                    "reference_id": "1616981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616981"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:051",
                    "reference_id": "RHSA-2003:051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:051"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:052",
                    "reference_id": "RHSA-2003:052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:052"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:091",
                    "reference_id": "RHSA-2003:091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:091"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:168",
                    "reference_id": "RHSA-2003:168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:168"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924871?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.5.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.5.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2003-0138"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vzx-hyh9-pubu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49838?format=api",
            "vulnerability_id": "VCID-5tkj-88u2-83ha",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50442",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50521",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50545",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5054",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50497",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50512",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50493",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50496",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00287",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52127",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5287",
                    "reference_id": "dsa-5287",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5287"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx",
                    "reference_id": "GHSA-mgqr-gvh6-23cx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-mgqr-gvh6-23cx"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html",
                    "reference_id": "msg00034.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5766-1/",
                    "reference_id": "USN-5766-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5766-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-41916"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkj-88u2-83ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91504?format=api",
            "vulnerability_id": "VCID-6pc6-jusr-tfgg",
            "summary": "telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91977",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91985",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91992",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91998",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92011",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92015",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92018",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92014",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92033",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9203",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92027",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/253-1/",
                    "reference_id": "USN-253-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/253-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924876?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.7.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.7.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-0677"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pc6-jusr-tfgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93251?format=api",
            "vulnerability_id": "VCID-81xv-v927-8fdz",
            "summary": "The transit path validation code in Heimdal before 7.3 might allow attackers to bypass the capath policy protection mechanism by leveraging failure to add the previous hop realm to the transit path of issued tickets.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48124",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48145",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48095",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48148",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48143",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48166",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48139",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4815",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48202",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48153",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6594"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6594"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924882?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.1.0%2Bdfsg-12?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.1.0%252Bdfsg-12%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-6594"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-81xv-v927-8fdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49839?format=api",
            "vulnerability_id": "VCID-bc1t-hzu5-bffd",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78838",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78841",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78815",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78843",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7884",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78771",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78803",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78785",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78818",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4",
                    "reference_id": "GHSA-88pm-hfmq-7vv4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T13:20:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-44640"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bc1t-hzu5-bffd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/121888?format=api",
            "vulnerability_id": "VCID-dcyh-dtgk-gydq",
            "summary": "The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username.  NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81998",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8201",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82032",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82027",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82054",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82061",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8208",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8207",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82063",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82097",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82098",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82099",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-5939"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924877?format=api",
                    "purl": "pkg:deb/debian/heimdal@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-5939"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyh-dtgk-gydq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/70429?format=api",
            "vulnerability_id": "VCID-ezmy-qjh7-6ycj",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://h5l.org/advisories.html?show=2017-12-08",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h5l.org/advisories.html?show=2017-12-08"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88428",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88427",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8842",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88419",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88434",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8843",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8841",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88416",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0918",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0918",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0918",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92663",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17439"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878144"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/heimdal/heimdal/commit/1a6a6e462dc2ac6111f9e02c6852ddec4849b887"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/issues/353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/heimdal/heimdal/issues/353"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2017/dsa-4055"
                },
                {
                    "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.h5l.org/pipermail/heimdal-announce/2017-December/000008.html"
                },
                {
                    "reference_url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.h5l.org/pipermail/heimdal-discuss/2017-August/000259.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439",
                    "reference_id": "CVE-2017-17439",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17439"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924881?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-17439"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezmy-qjh7-6ycj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47964?format=api",
            "vulnerability_id": "VCID-frnd-3wwy-93ek",
            "summary": "Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14870.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89278",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89297",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89317",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89324",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89338",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89337",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04669",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89332",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14870"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14870"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589",
                    "reference_id": "1778589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778589"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786",
                    "reference_id": "946786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-52",
                    "reference_id": "GLSA-202003-52",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-52"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-1/",
                    "reference_id": "USN-4217-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4217-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4217-2/",
                    "reference_id": "USN-4217-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4217-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924884?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-14870"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frnd-3wwy-93ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91035?format=api",
            "vulnerability_id": "VCID-fxhm-q84c-pyhb",
            "summary": "Multiple buffer overflows in Heimdal before 0.5, possibly in both the (1) kadmind and (2) kdc servers, may allow remote attackers to gain root access.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80931",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8094",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80962",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80961",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80998",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8099",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81028",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81029",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01481",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81027",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1225"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924866?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.4e-21?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-21%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2002-1225"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fxhm-q84c-pyhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91188?format=api",
            "vulnerability_id": "VCID-hzb7-vff4-qufw",
            "summary": "k5admind (kadmind) for Heimdal allows remote attackers to execute arbitrary code via a Kerberos 4 compatibility administration request whose framing length is less than 2, which leads to a heap-based buffer overflow.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0434",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95785",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95803",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95806",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95814",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95817",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95822",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95833",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95839",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.22372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95842",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0434"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0434",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0434"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924873?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2004-0434"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzb7-vff4-qufw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91391?format=api",
            "vulnerability_id": "VCID-j7kn-5ch6-13du",
            "summary": "Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83764",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83664",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83677",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83691",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83694",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83717",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83724",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8374",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83734",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83729",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83763",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040"
                },
                {
                    "reference_url": "http://secunia.com/advisories/15718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/15718"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-758"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_40_heimdal.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_40_heimdal.html"
                },
                {
                    "reference_url": "http://www.pdc.kth.se/heimdal/advisory/2005-06-20/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.pdc.kth.se/heimdal/advisory/2005-06-20/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315065",
                    "reference_id": "315065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315065"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.3f:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4a:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4b:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4c:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4d:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.4e:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.5.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:telnetd:telnetd:0.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2040",
                    "reference_id": "CVE-2005-2040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2040"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924875?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.6.3-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.3-11%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-2040"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7kn-5ch6-13du"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62434?format=api",
            "vulnerability_id": "VCID-jfb1-3vg4-vbap",
            "summary": "Multiple vulnerabilities have been found in MIT Kerberos 5, the\n    most severe of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02257427"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041615.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041645.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041654.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=134254866602253&w=2"
                },
                {
                    "reference_url": "http://osvdb.org/64744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/64744"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1321.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83073",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82969",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82985",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82998",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8302",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83027",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83032",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8307",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39762"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39784"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39799"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39818"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39849"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40346"
                },
                {
                    "reference_url": "http://secunia.com/advisories/40685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/40685"
                },
                {
                    "reference_url": "http://secunia.com/advisories/41967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/41967"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42432",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42432"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42974"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43335",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43335"
                },
                {
                    "reference_url": "http://secunia.com/advisories/44954",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/44954"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11604"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7198"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7450"
                },
                {
                    "reference_url": "http://support.avaya.com/css/P8/documents/100114315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.avaya.com/css/P8/documents/100114315"
                },
                {
                    "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2010-005.txt"
                },
                {
                    "reference_url": "http://www.debian.org/security/2010/dsa-2052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2010/dsa-2052"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:100"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujuly2011-313328.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0423.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0770.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0807.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0873.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0935.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2010-0987.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0152.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/511331/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/40235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/40235"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-940-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-940-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-940-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-940-2"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA10-287A.html"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA11-201A.html"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1177"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1192"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1193"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1196"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1222"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1574",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1574"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/1882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/1882"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2010/3112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2010/3112"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0134"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261",
                    "reference_id": "582261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=582261"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466",
                    "reference_id": "582466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database_server:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321",
                    "reference_id": "CVE-2010-1321",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-13",
                    "reference_id": "GLSA-201201-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0423",
                    "reference_id": "RHSA-2010:0423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0873",
                    "reference_id": "RHSA-2010:0873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0873"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0935",
                    "reference_id": "RHSA-2010:0935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0935"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0152",
                    "reference_id": "RHSA-2011:0152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0152"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/940-1/",
                    "reference_id": "USN-940-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/940-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/940-2/",
                    "reference_id": "USN-940-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/940-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924878?format=api",
                    "purl": "pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.4.0~git20100605.dfsg.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-1321"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfb1-3vg4-vbap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49836?format=api",
            "vulnerability_id": "VCID-jhcx-pb5e-8kev",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5744",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57411",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57481",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57438",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57464",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57434",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5741",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57462",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57465",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580",
                    "reference_id": "f9ec7002cdd526ae84fbacbf153162e118f22580",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/commit/f9ec7002cdd526ae84fbacbf153162e118f22580"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv",
                    "reference_id": "GHSA-69h9-669w-88xv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-69h9-669w-88xv"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-14T15:56:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-44758"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jhcx-pb5e-8kev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89824?format=api",
            "vulnerability_id": "VCID-kmgq-s8my-u7cm",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1235.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96856",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96868",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96873",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96883",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96885",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96887",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96895",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.969",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.32917",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96903",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1235"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1235"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616862",
                    "reference_id": "1616862",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616862"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2002:242",
                    "reference_id": "RHSA-2002:242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2002:242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2002:250",
                    "reference_id": "RHSA-2002:250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2002:250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2003:168",
                    "reference_id": "RHSA-2003:168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2003:168"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924870?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.4e-22?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.4e-22%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2002-1235"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kmgq-s8my-u7cm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89156?format=api",
            "vulnerability_id": "VCID-ny6v-nczj-x7dw",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc"
                },
                {
                    "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0469.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97689",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97696",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97697",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97701",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97704",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97708",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9771",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97711",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.4782",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97717",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469"
                },
                {
                    "reference_url": "http://secunia.com/advisories/14745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/14745"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17899",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17899"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1"
                },
                {
                    "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1"
                },
                {
                    "reference_url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt"
                },
                {
                    "reference_url": "http://www.debian.de/security/2005/dsa-731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.de/security/2005/dsa-731"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-697"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-699"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-703"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/291924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.kb.cert.org/vuls/id/291924"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-327.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-330.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/12918",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/12918"
                },
                {
                    "reference_url": "http://www.ubuntulinux.org/usn/usn-224-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntulinux.org/usn/usn-224-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617528",
                    "reference_id": "1617528",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617528"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036",
                    "reference_id": "302036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302036"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469",
                    "reference_id": "CVE-2005-0469",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:327",
                    "reference_id": "RHSA-2005:327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:330",
                    "reference_id": "RHSA-2005:330",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:330"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/101-1/",
                    "reference_id": "USN-101-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/101-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/224-1/",
                    "reference_id": "USN-224-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/224-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924874?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.6.3-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.6.3-10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-0469"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ny6v-nczj-x7dw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74701?format=api",
            "vulnerability_id": "VCID-r49y-kqyv-pkbq",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86205",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86211",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86202",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89334",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89351",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89353",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8937",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89374",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89383",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8938",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89376",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12098"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12098"
                },
                {
                    "reference_url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html",
                    "reference_id": "000009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://www.h5l.org/pipermail/heimdal-announce/2019-May/000009.html"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jun/1"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf",
                    "reference_id": "2f7f3d9960aa6ea21358bdf3687cee5149aa35cf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72",
                    "reference_id": "3e58559...bbafe72",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/compare/3e58559...bbafe72"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064",
                    "reference_id": "929064",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929064"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4455",
                    "reference_id": "dsa-4455",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2019/dsa-4455"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/",
                    "reference_id": "GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIXEDVVMPD6ZAJSMI2EZ7FNEIVNWE5PD/"
                },
                {
                    "reference_url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0",
                    "reference_id": "heimdal-7.6.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://github.com/heimdal/heimdal/releases/tag/heimdal-7.6.0"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html",
                    "reference_id": "msg00026.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/",
                    "reference_id": "SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:49:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLXXIF4LOQEAEDAF4UGP2AO6WDNTDFUB/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924883?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.5.0%2Bdfsg-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.5.0%252Bdfsg-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-12098"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r49y-kqyv-pkbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49841?format=api",
            "vulnerability_id": "VCID-rfpr-mdg9-3uaa",
            "summary": "Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45142.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25124",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25211",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25157",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25166",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25304",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25346",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25192",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25252",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45142"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45142"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2023/02/08/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2023/02/08/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849",
                    "reference_id": "1030849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1030849"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672",
                    "reference_id": "2166672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166672"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-06T20:20:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5849-1/",
                    "reference_id": "USN-5849-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5849-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924888?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-45142"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfpr-mdg9-3uaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48490?format=api",
            "vulnerability_id": "VCID-s2ne-rcp3-nbgz",
            "summary": "Multiple vulnerabilities have been discovered in Samba, the worst of which could result in root remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3437.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72612",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72529",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72545",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72522",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72568",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72621",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/08/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/02/08/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187",
                    "reference_id": "1024187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024187"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774",
                    "reference_id": "2137774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137774"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2828",
                    "reference_id": "AVG-2828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2828"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-3437",
                    "reference_id": "CVE-2022-3437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-3437"
                },
                {
                    "reference_url": "https://www.samba.org/samba/security/CVE-2022-3437.html",
                    "reference_id": "CVE-2022-3437.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://www.samba.org/samba/security/CVE-2022-3437.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202309-06",
                    "reference_id": "GLSA-202309-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202309-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-06",
                    "reference_id": "GLSA-202310-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-06"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
                    "reference_id": "ntap-20230216-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T18:53:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5800-1/",
                    "reference_id": "USN-5800-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5800-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5822-1/",
                    "reference_id": "USN-5822-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5822-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5936-1/",
                    "reference_id": "USN-5936-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5936-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7582-1/",
                    "reference_id": "USN-7582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924887?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221115.a6cf945%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-3437"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s2ne-rcp3-nbgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63790?format=api",
            "vulnerability_id": "VCID-tcbv-cguk-hfg2",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11103.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90907",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90912",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90922",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90932",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9095",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90959",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90983",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90981",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90982",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11103"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976",
                    "reference_id": "1469976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1469976"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208",
                    "reference_id": "868208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868208"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209",
                    "reference_id": "868209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-1/",
                    "reference_id": "USN-3353-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-2/",
                    "reference_id": "USN-3353-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-3/",
                    "reference_id": "USN-3353-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3353-4/",
                    "reference_id": "USN-3353-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3353-4/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924880?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.4.0.dfsg.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.4.0.dfsg.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-11103"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcbv-cguk-hfg2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33935?format=api",
            "vulnerability_id": "VCID-unvx-tsxw-abbw",
            "summary": "A boundary error in Heimdal could result in execution of arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4862.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9974",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99742",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99743",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.92585",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99745",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4862"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325",
                    "reference_id": "770325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770325"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb",
                    "reference_id": "CVE-2011-4862;OSVDB-78020",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/remote/18369.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c",
                    "reference_id": "CVE-2011-4862;OSVDB-78020",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18280.c"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb",
                    "reference_id": "CVE-2011-4862;OSVDB-78020",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/18368.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201201-14",
                    "reference_id": "GLSA-201201-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201201-14"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201202-05",
                    "reference_id": "GLSA-201202-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201202-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1851",
                    "reference_id": "RHSA-2011:1851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1851"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1852",
                    "reference_id": "RHSA-2011:1852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1852"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1853",
                    "reference_id": "RHSA-2011:1853",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1853"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1854",
                    "reference_id": "RHSA-2011:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1854"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924879?format=api",
                    "purl": "pkg:deb/debian/heimdal@1.5.dfsg.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@1.5.dfsg.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4862"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unvx-tsxw-abbw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97700?format=api",
            "vulnerability_id": "VCID-vq9j-dspn-kke2",
            "summary": "The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35228",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.352",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37559",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37593",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3758",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37515",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37533",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41035",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41138",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00192",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41109",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3116"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/730793",
                    "reference_id": "730793",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T19:11:22Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/730793"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230505-0010/",
                    "reference_id": "ntap-20230505-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-24T19:11:22Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230505-0010/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924877?format=api",
                    "purl": "pkg:deb/debian/heimdal@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-3116"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vq9j-dspn-kke2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59029?format=api",
            "vulnerability_id": "VCID-wgdd-6dt5-37ge",
            "summary": "An error in the rshd daemon of Heimdal could allow authenticated users to\n    elevate privileges.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2716",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.272",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27237",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27098",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27148",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27105",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27047",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27056",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2703",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26993",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-0582"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200603-14",
                    "reference_id": "GLSA-200603-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200603-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/247-1/",
                    "reference_id": "USN-247-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/247-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924876?format=api",
                    "purl": "pkg:deb/debian/heimdal@0.7.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@0.7.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-0582"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wgdd-6dt5-37ge"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80058?format=api",
            "vulnerability_id": "VCID-ws2g-8ye2-pkdk",
            "summary": "samba: Null pointer dereference on missing sname in TGS-REQ",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86538",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86618",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86613",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86548",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86567",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86568",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86586",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86596",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8661",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86607",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44758"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3437"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41916"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080",
                    "reference_id": "2013080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586",
                    "reference_id": "996586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996586"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2418",
                    "reference_id": "AVG-2418",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2418"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5142-1/",
                    "reference_id": "USN-5142-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5142-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5174-1/",
                    "reference_id": "USN-5174-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5174-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5675-1/",
                    "reference_id": "USN-5675-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5675-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924886?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924867?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-2%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-2%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924885?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.7.0%2Bdfsg-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.7.0%252Bdfsg-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924865?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924869?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/924868?format=api",
                    "purl": "pkg:deb/debian/heimdal@7.8.git20221117.28daf24%2Bdfsg-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-11%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3671"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws2g-8ye2-pkdk"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/heimdal@7.8.git20221117.28daf24%252Bdfsg-9%3Fdistro=trixie"
}