Lookup for vulnerable packages by Package URL.

GET /api/packages/937808?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
    "type": "deb",
    "namespace": "debian",
    "name": "ring",
    "version": "20210112.2.b757bac~ds1-1",
    "qualifiers": {
        "distro": "bullseye"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "20210112.2.b757bac~ds1-1+deb11u1",
    "latest_non_vulnerable_version": "20230206.0~ds2-1.1+deb12u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31370?format=api",
            "vulnerability_id": "VCID-tqwd-ffwc-mkd1",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81774",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81797",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81795",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81821",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81828",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81847",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81835",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81829",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976",
                    "reference_id": "1014976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213",
                    "reference_id": "947bc1ee6d05be10204b918df75a503415fd3213",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/947bc1ee6d05be10204b918df75a503415fd3213"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5285",
                    "reference_id": "dsa-5285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5285"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799",
                    "reference_id": "GHSA-rwgw-vwxg-q799",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-rwgw-vwxg-q799"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html",
                    "reference_id": "msg00047.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:55:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24792"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqwd-ffwc-mkd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31369?format=api",
            "vulnerability_id": "VCID-w9ce-m3x8-n3ak",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72929",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72948",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72925",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72962",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72975",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7298",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72973",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976",
                    "reference_id": "1014976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24786"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9ce-m3x8-n3ak"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46650?format=api",
            "vulnerability_id": "VCID-1gsq-daax-mfey",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40124",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40274",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40221",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40285",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40258",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40239",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15260"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815",
                    "reference_id": "986815",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-42",
                    "reference_id": "GLSA-202107-42",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-42"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2020-15260"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1gsq-daax-mfey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95092?format=api",
            "vulnerability_id": "VCID-34fv-tv5a-tkgw",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58944",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58904",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58956",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58962",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58981",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58963",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58915",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00372",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58938",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092",
                    "reference_id": "1032092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1",
                    "reference_id": "d8440f4d711a654b511f50f79c0445b26f9dd1e1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/d8440f4d711a654b511f50f79c0445b26f9dd1e1"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w",
                    "reference_id": "GHSA-9pfh-r8x4-w26w",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-23537"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34fv-tv5a-tkgw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31365?format=api",
            "vulnerability_id": "VCID-48pt-6j6q-jbcn",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00784",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73759",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00784",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73768",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00784",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73786",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00786",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73772",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00786",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73796",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00786",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73766",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00786",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00786",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73814",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html",
                    "reference_id": "Asterisk-Project-Security-Advisory-AST-2022-005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/166226/Asterisk-Project-Security-Advisory-AST-2022-005.html"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f",
                    "reference_id": "db3235953baa56d2fb0e276ca510fefca751643f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/db3235953baa56d2fb0e276ca510fefca751643f"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5285",
                    "reference_id": "dsa-5285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5285"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62",
                    "reference_id": "GHSA-ffff-m5fm-qm62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-ffff-m5fm-qm62"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html",
                    "reference_id": "msg00040.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00040.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-23608"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-48pt-6j6q-jbcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31358?format=api",
            "vulnerability_id": "VCID-7m8s-6ydk-gbgr",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48294",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48285",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48309",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48283",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48234",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4829",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48566",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-2/",
                    "reference_id": "USN-6422-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-37706"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7m8s-6ydk-gbgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31363?format=api",
            "vulnerability_id": "VCID-8sys-3sj7-c3h6",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64147",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64175",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64185",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64201",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00462",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64204",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a",
                    "reference_id": "22af44e68a0c7d190ac1e25075e1382f77e9397a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/22af44e68a0c7d190ac1e25075e1382f77e9397a"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5285",
                    "reference_id": "dsa-5285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5285"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36",
                    "reference_id": "GHSA-m66q-q64c-hv36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-m66q-q64c-hv36"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-21722"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8sys-3sj7-c3h6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94955?format=api",
            "vulnerability_id": "VCID-8yav-jpp1-rfbe",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55471",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55583",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5938",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59397",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59412",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5943",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59414",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59396",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43299"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8yav-jpp1-rfbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31374?format=api",
            "vulnerability_id": "VCID-9at6-bgzv-gue3",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44513",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44535",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44523",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44529",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44545",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44515",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44516",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092",
                    "reference_id": "1032092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937811?format=api",
                    "purl": "pkg:deb/debian/ring@0?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@0%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-39269"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9at6-bgzv-gue3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31362?format=api",
            "vulnerability_id": "VCID-9f9j-z7y7-sffy",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51925",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51973",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51999",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51965",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52019",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52052",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00285",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52036",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43845"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9f9j-z7y7-sffy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47565?format=api",
            "vulnerability_id": "VCID-ap3n-99gn-aucs",
            "summary": "A vulnerability has been discovered in PJSIP, which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6572",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6575",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6577",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6578",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65801",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65787",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00495",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65757",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27585"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036697",
                    "reference_id": "1036697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036697"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5",
                    "reference_id": "d1c5e4da5bae7f220bc30719888bb389c905c0c5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/d1c5e4da5bae7f220bc30719888bb389c905c0c5"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5438",
                    "reference_id": "dsa-5438",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5438"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4",
                    "reference_id": "GHSA-p6g5-v97c-w5q4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr",
                    "reference_id": "GHSA-q9cp-8wcq-7pfr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-q9cp-8wcq-7pfr"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-05",
                    "reference_id": "GLSA-202409-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-05"
                },
                {
                    "reference_url": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm",
                    "reference_id": "group__PJ__DNS__RESOLVER.htm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://www.pjsip.org/pjlib-util/docs/html/group__PJ__DNS__RESOLVER.htm"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html",
                    "reference_id": "msg00020.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00020.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-2/",
                    "reference_id": "USN-6422-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2023-27585"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap3n-99gn-aucs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94957?format=api",
            "vulnerability_id": "VCID-byqv-c5jp-6ybg",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65068",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65118",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68244",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68259",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68238",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43301"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byqv-c5jp-6ybg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31364?format=api",
            "vulnerability_id": "VCID-ddpb-zwva-rfc5",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64457",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64511",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64526",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64515",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64487",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896",
                    "reference_id": "077b465c33f0aec05a49cd2ca456f9a1b112e896",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/077b465c33f0aec05a49cd2ca456f9a1b112e896"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/2"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html",
                    "reference_id": "Asterisk-Project-Security-Advisory-AST-2022-006.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/166227/Asterisk-Project-Security-Advisory-AST-2022-006.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5285",
                    "reference_id": "dsa-5285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5285"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm",
                    "reference_id": "GHSA-7fw8-54cv-r7pm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-7fw8-54cv-r7pm"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:57:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-21723"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ddpb-zwva-rfc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46651?format=api",
            "vulnerability_id": "VCID-dvf7-hwzb-4kg9",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79755",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79762",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79784",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79806",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79828",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79812",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01311",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79805",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21375"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21375"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815",
                    "reference_id": "986815",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986815"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-42",
                    "reference_id": "GLSA-202107-42",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-42"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-21375"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvf7-hwzb-4kg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31357?format=api",
            "vulnerability_id": "VCID-epzp-dpmr-33df",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83919",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83934",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85996",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86015",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86025",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86039",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86032",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32686"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991931",
                    "reference_id": "991931",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991931"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-32686"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epzp-dpmr-33df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31361?format=api",
            "vulnerability_id": "VCID-f5qc-tsbr-1yap",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53266",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5329",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53315",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53285",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53332",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53383",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5335",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43804"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f5qc-tsbr-1yap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31367?format=api",
            "vulnerability_id": "VCID-hj93-7z1r-vkfk",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80416",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80405",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80434",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80444",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80448",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80441",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976",
                    "reference_id": "1014976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24763"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hj93-7z1r-vkfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31371?format=api",
            "vulnerability_id": "VCID-n6mj-v1nc-hke9",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68493",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68469",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68519",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68536",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68563",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6855",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00568",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68518",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976",
                    "reference_id": "1014976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a",
                    "reference_id": "9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5285",
                    "reference_id": "dsa-5285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5285"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4",
                    "reference_id": "GHSA-p6g5-v97c-w5q4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html",
                    "reference_id": "msg00047.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00047.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24793"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6mj-v1nc-hke9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94959?format=api",
            "vulnerability_id": "VCID-nf5d-nejq-mkd9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63734",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63795",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67112",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67086",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67136",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67148",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67167",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67153",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67122",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43303"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nf5d-nejq-mkd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31372?format=api",
            "vulnerability_id": "VCID-ngds-k5mh-t3ae",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72462",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72438",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72476",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72489",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72511",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72494",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00721",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72484",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017004",
                    "reference_id": "1017004",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017004"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017005",
                    "reference_id": "1017005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017005"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202",
                    "reference_id": "450baca94f475345542c6953832650c390889202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/450baca94f475345542c6953832650c390889202"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5358",
                    "reference_id": "dsa-5358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5358"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj",
                    "reference_id": "GHSA-26j7-ww69-c4qj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-26j7-ww69-c4qj"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:49:22Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-31031"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ngds-k5mh-t3ae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95093?format=api",
            "vulnerability_id": "VCID-psbg-wv2x-w7ba",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60308",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60277",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60327",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60342",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60363",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60349",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6033",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092",
                    "reference_id": "1032092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032092"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36",
                    "reference_id": "bc4812d31a67d5e2f973fbfaf950d6118226cf36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/bc4812d31a67d5e2f973fbfaf950d6118226cf36"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w",
                    "reference_id": "GHSA-9pfh-r8x4-w26w",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-9pfh-r8x4-w26w"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr",
                    "reference_id": "GHSA-cxwq-5g9x-x7fr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-cxwq-5g9x-x7fr"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:11:54Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-23547"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-psbg-wv2x-w7ba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31366?format=api",
            "vulnerability_id": "VCID-tw8d-u845-r3dq",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64356",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64385",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64344",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64393",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64408",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6442",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00466",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64379",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24754"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24754"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47",
                    "reference_id": "d27f79da11df7bc8bb56c2f291d71e54df8d2c47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/d27f79da11df7bc8bb56c2f291d71e54df8d2c47"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662",
                    "reference_id": "GHSA-73f7-48m9-w662",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-73f7-48m9-w662"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:55:12Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24754"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tw8d-u845-r3dq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31373?format=api",
            "vulnerability_id": "VCID-vwf4-v4ve-4yfh",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55475",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55478",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5553",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55539",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55519",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55502",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23537"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37325"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39244"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39269"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42706"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae",
                    "reference_id": "c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/c4d34984ec92b3d5252a7d5cddd85a1d3a8001ae"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5358",
                    "reference_id": "dsa-5358",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5358"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj",
                    "reference_id": "GHSA-fq45-m3f7-3mhj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00029.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-39244"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwf4-v4ve-4yfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31368?format=api",
            "vulnerability_id": "VCID-y6sx-xqsh-wbcg",
            "summary": "Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76197",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76229",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76209",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76241",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76254",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76281",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76258",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976",
                    "reference_id": "1014976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014976"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00",
                    "reference_id": "560a1346f87aabe126509bb24930106dea292b00",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/commit/560a1346f87aabe126509bb24930106dea292b00"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5285",
                    "reference_id": "dsa-5285",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5285"
                },
                {
                    "reference_url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m",
                    "reference_id": "GHSA-f5qg-pqcg-765m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://github.com/pjsip/pjproject/security/advisories/GHSA-f5qg-pqcg-765m"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-37",
                    "reference_id": "GLSA-202210-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-37"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html",
                    "reference_id": "msg00021.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html",
                    "reference_id": "msg00038.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:28Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2022-24764"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y6sx-xqsh-wbcg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94956?format=api",
            "vulnerability_id": "VCID-yx1m-ayfg-ryc3",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65068",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65118",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68244",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68259",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68238",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43300"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yx1m-ayfg-ryc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94958?format=api",
            "vulnerability_id": "VCID-zxkf-88k3-3qcn",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5817",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61902",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61873",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61922",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61939",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61949",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61928",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37706"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43299"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43301"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43302"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43804"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21723"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24763"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24786"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26651"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998",
                    "reference_id": "1014998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014998"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6422-1/",
                    "reference_id": "USN-6422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6422-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8122-1/",
                    "reference_id": "USN-8122-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8122-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937808?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1?distro=bullseye",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-tqwd-ffwc-mkd1"
                        },
                        {
                            "vulnerability": "VCID-w9ce-m3x8-n3ak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937810?format=api",
                    "purl": "pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%2Bdeb11u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%252Bdeb11u1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937809?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds1-1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds1-1%3Fdistro=bullseye"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937807?format=api",
                    "purl": "pkg:deb/debian/ring@20230206.0~ds2-1.1%2Bdeb12u1?distro=bullseye",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20230206.0~ds2-1.1%252Bdeb12u1%3Fdistro=bullseye"
                }
            ],
            "aliases": [
                "CVE-2021-43302"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxkf-88k3-3qcn"
        }
    ],
    "risk_score": "3.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ring@20210112.2.b757bac~ds1-1%3Fdistro=bullseye"
}