Lookup for vulnerable packages by Package URL.

GET /api/packages/943735?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/943735?format=api",
    "purl": "pkg:deb/debian/xz-utils@5.4.1-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "xz-utils",
    "version": "5.4.1-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "5.6.1+really5.4.5-1",
    "latest_non_vulnerable_version": "5.8.3-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97089?format=api",
            "vulnerability_id": "VCID-d4bu-exey-kqf8",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34743.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-34743.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12885",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13085",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17307",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17274",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17564",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17517",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17491",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17551",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34743"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132497",
                    "reference_id": "1132497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132497"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454589",
                    "reference_id": "2454589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2454589"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87",
                    "reference_id": "c8c22869e780ff57c96b46939c3d79ff99395f87",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-03T12:58:58Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/commit/c8c22869e780ff57c96b46939c3d79ff99395f87"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv",
                    "reference_id": "GHSA-x872-m794-cxhv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-03T12:58:58Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/security/advisories/GHSA-x872-m794-cxhv"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7647",
                    "reference_id": "RHSA-2026:7647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7647"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/releases/tag/v5.8.3",
                    "reference_id": "v5.8.3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-03T12:58:58Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/releases/tag/v5.8.3"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1042005?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.3-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-34743"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d4bu-exey-kqf8"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49055?format=api",
            "vulnerability_id": "VCID-3adf-qttu-3kfd",
            "summary": "A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74293",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74207",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74213",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7424",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74212",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74245",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74259",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74281",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74254",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74292",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00813",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74302",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167",
                    "reference_id": "1009167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168",
                    "reference_id": "1009168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310",
                    "reference_id": "2073310",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/04/07/8",
                    "reference_id": "8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-7",
                    "reference_id": "ASA-202204-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-8",
                    "reference_id": "ASA-202204-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2665",
                    "reference_id": "AVG-2665",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2665"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2666",
                    "reference_id": "AVG-2666",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2666"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2022-1271",
                    "reference_id": "CVE-2022-1271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2022-1271"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2022-1271",
                    "reference_id": "CVE-2022-1271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-01",
                    "reference_id": "GLSA-202209-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-01"
                },
                {
                    "reference_url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html",
                    "reference_id": "msg00011.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220930-0006/",
                    "reference_id": "ntap-20220930-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220930-0006/"
                },
                {
                    "reference_url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6",
                    "reference_id": "?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1537",
                    "reference_id": "RHSA-2022:1537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1592",
                    "reference_id": "RHSA-2022:1592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1665",
                    "reference_id": "RHSA-2022:1665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1676",
                    "reference_id": "RHSA-2022:1676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2191",
                    "reference_id": "RHSA-2022:2191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2191"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4582",
                    "reference_id": "RHSA-2022:4582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4896",
                    "reference_id": "RHSA-2022:4896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4896"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4940",
                    "reference_id": "RHSA-2022:4940",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4940"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4991",
                    "reference_id": "RHSA-2022:4991",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4991"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4992",
                    "reference_id": "RHSA-2022:4992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4992"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4993",
                    "reference_id": "RHSA-2022:4993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4993"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4994",
                    "reference_id": "RHSA-2022:4994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4994"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5052",
                    "reference_id": "RHSA-2022:5052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5052"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5439",
                    "reference_id": "RHSA-2022:5439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5439"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5378-1/",
                    "reference_id": "USN-5378-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5378-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5378-2/",
                    "reference_id": "USN-5378-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5378-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5378-3/",
                    "reference_id": "USN-5378-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5378-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5378-4/",
                    "reference_id": "USN-5378-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5378-4/"
                },
                {
                    "reference_url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch",
                    "reference_id": "xzgrep-ZDI-CAN-16587.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"
                        }
                    ],
                    "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943737?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943740?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.2.5-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.2.5-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943735?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.4.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.4.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943739?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943738?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.2-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1042005?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.3-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-1271"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85663?format=api",
            "vulnerability_id": "VCID-6t3x-xag4-7fdq",
            "summary": "xzgrep: incorrect parsing of filenames containing a semicolon",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4035.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4035.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69756",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69796",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69812",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69835",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6982",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69805",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69847",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69856",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69838",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4035"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223341",
                    "reference_id": "1223341",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223341"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943736?format=api",
                    "purl": "pkg:deb/debian/xz-utils@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943737?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943735?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.4.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.4.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943739?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943738?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.2-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1042005?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.3-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-4035"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t3x-xag4-7fdq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56150?format=api",
            "vulnerability_id": "VCID-hgac-uqw4-skdg",
            "summary": "A vulnerability has been discovered in XZ Utils, which could lead to denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48994",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49022",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48975",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49029",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49026",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49015",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49066",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49063",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31115"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357249",
                    "reference_id": "2357249",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357249"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2860",
                    "reference_id": "AVG-2860",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2860"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2861",
                    "reference_id": "AVG-2861",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2861"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/commit/d5a2ffe41bb77b918a8c96084885d4dbe4bf6480",
                    "reference_id": "d5a2ffe41bb77b918a8c96084885d4dbe4bf6480",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T17:57:35Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/commit/d5a2ffe41bb77b918a8c96084885d4dbe4bf6480"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2",
                    "reference_id": "GHSA-6cc8-p5mm-29w2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T17:57:35Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202504-01",
                    "reference_id": "GLSA-202504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202504-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:7524",
                    "reference_id": "RHSA-2025:7524",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:7524"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7414-1/",
                    "reference_id": "USN-7414-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7414-1/"
                },
                {
                    "reference_url": "https://tukaani.org/xz/xz-cve-2025-31115.patch",
                    "reference_id": "xz-cve-2025-31115.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T17:57:35Z/"
                        }
                    ],
                    "url": "https://tukaani.org/xz/xz-cve-2025-31115.patch"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943736?format=api",
                    "purl": "pkg:deb/debian/xz-utils@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943737?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943735?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.4.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.4.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943739?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943738?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.2-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1042005?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.3-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-31115"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hgac-uqw4-skdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49711?format=api",
            "vulnerability_id": "VCID-mxdu-xpe6-muhw",
            "summary": "A backdoor has been discovered in XZ utils that could lead to remote compromise of systems.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3094.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3094.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.84077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99309",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.84805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99337",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99353",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99351",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99348",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99347",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.84976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99349",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.85225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99352",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3094"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272210",
                    "reference_id": "2272210",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-04-02T04:00:23Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272210"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2024/03/29/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-04-02T04:00:23Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2024/03/29/4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202403-1",
                    "reference_id": "ASA-202403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202403-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2851",
                    "reference_id": "AVG-2851",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2851"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:8",
                    "reference_id": "cpe:/a:redhat:jboss_enterprise_application_platform:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:jboss_enterprise_application_platform:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2024-3094",
                    "reference_id": "CVE-2024-3094",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-04-02T04:00:23Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2024-3094"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202403-04",
                    "reference_id": "GLSA-202403-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202403-04"
                },
                {
                    "reference_url": "https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users",
                    "reference_id": "urgent-security-alert-fedora-41-and-rawhide-users",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-04-02T04:00:23Z/"
                        }
                    ],
                    "url": "https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943736?format=api",
                    "purl": "pkg:deb/debian/xz-utils@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943737?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943735?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.4.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.4.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943741?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.6.1%2Breally5.4.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.6.1%252Breally5.4.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943739?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943738?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.2-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1042005?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.3-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-3094"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mxdu-xpe6-muhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73717?format=api",
            "vulnerability_id": "VCID-uwt9-ujyv-aqbj",
            "summary": "xz: XZ Utils on Microsoft Windows platform are vulnerable to argument injection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47611.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47611.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59866",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59849",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5987",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5988",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59791",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59815",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59784",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59835",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47611"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316125",
                    "reference_id": "2316125",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316125"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/commit/bf518b9ba446327a062ddfe67e7e0a5baed2394f",
                    "reference_id": "bf518b9ba446327a062ddfe67e7e0a5baed2394f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T15:28:51Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/commit/bf518b9ba446327a062ddfe67e7e0a5baed2394f"
                },
                {
                    "reference_url": "https://github.com/tukaani-project/xz/security/advisories/GHSA-m538-c5qw-3cg4",
                    "reference_id": "GHSA-m538-c5qw-3cg4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-02T15:28:51Z/"
                        }
                    ],
                    "url": "https://github.com/tukaani-project/xz/security/advisories/GHSA-m538-c5qw-3cg4"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943736?format=api",
                    "purl": "pkg:deb/debian/xz-utils@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943737?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.2.5-2.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943735?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.4.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.4.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943739?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943738?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.2-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-d4bu-exey-kqf8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.2-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1042005?format=api",
                    "purl": "pkg:deb/debian/xz-utils@5.8.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.8.3-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47611"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uwt9-ujyv-aqbj"
        }
    ],
    "risk_score": "2.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xz-utils@5.4.1-1%3Fdistro=trixie"
}