Lookup for vulnerable packages by Package URL.

GET /api/packages/943987?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "znuny",
    "version": "0",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "6.4.5-1",
    "latest_non_vulnerable_version": "6.5.19-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/236440?format=api",
            "vulnerability_id": "VCID-12v6-61me-ffa1",
            "summary": "An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70865",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70848",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70833",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70878",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70885",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70787",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70806",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70781",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70825",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70841",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70864",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32492"
                },
                {
                    "reference_url": "https://znuny.com",
                    "reference_id": "znuny.com",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/"
                        }
                    ],
                    "url": "https://znuny.com"
                },
                {
                    "reference_url": "https://www.znuny.org/en/advisories/zsa-2024-02",
                    "reference_id": "zsa-2024-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-05T15:52:23Z/"
                        }
                    ],
                    "url": "https://www.znuny.org/en/advisories/zsa-2024-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
                    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-169g-wxmh-qqbw"
                        },
                        {
                            "vulnerability": "VCID-1mkr-c1ay-jygw"
                        },
                        {
                            "vulnerability": "VCID-2rbn-u9eg-sua7"
                        },
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-cqx8-tegf-pfhh"
                        },
                        {
                            "vulnerability": "VCID-kfqh-mtw2-3feu"
                        },
                        {
                            "vulnerability": "VCID-kr13-v6jr-5kg6"
                        },
                        {
                            "vulnerability": "VCID-ndgh-dr9p-kqbu"
                        },
                        {
                            "vulnerability": "VCID-qysv-aehy-d7ay"
                        },
                        {
                            "vulnerability": "VCID-s8fu-wpk4-3ycc"
                        },
                        {
                            "vulnerability": "VCID-x1sc-wvc6-a3hz"
                        },
                        {
                            "vulnerability": "VCID-yrdb-btgm-p3cd"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-32492"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-12v6-61me-ffa1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94823?format=api",
            "vulnerability_id": "VCID-2yyp-zhcc-mbgq",
            "summary": "Specially crafted string in OTRS system configuration can allow the execution of any system command.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72417",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72423",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72456",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72468",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72492",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72464",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72506",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72514",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72504",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36100"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36100"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
                    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-169g-wxmh-qqbw"
                        },
                        {
                            "vulnerability": "VCID-1mkr-c1ay-jygw"
                        },
                        {
                            "vulnerability": "VCID-2rbn-u9eg-sua7"
                        },
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-cqx8-tegf-pfhh"
                        },
                        {
                            "vulnerability": "VCID-kfqh-mtw2-3feu"
                        },
                        {
                            "vulnerability": "VCID-kr13-v6jr-5kg6"
                        },
                        {
                            "vulnerability": "VCID-ndgh-dr9p-kqbu"
                        },
                        {
                            "vulnerability": "VCID-qysv-aehy-d7ay"
                        },
                        {
                            "vulnerability": "VCID-s8fu-wpk4-3ycc"
                        },
                        {
                            "vulnerability": "VCID-x1sc-wvc6-a3hz"
                        },
                        {
                            "vulnerability": "VCID-yrdb-btgm-p3cd"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-36100"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2yyp-zhcc-mbgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94657?format=api",
            "vulnerability_id": "VCID-57jx-quzh-fubc",
            "summary": "Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44548",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44628",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44648",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44585",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44637",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44655",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44625",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4468",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44672",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0022",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44603",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21443"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21443"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593",
                    "reference_id": "991593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
                    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-169g-wxmh-qqbw"
                        },
                        {
                            "vulnerability": "VCID-1mkr-c1ay-jygw"
                        },
                        {
                            "vulnerability": "VCID-2rbn-u9eg-sua7"
                        },
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-cqx8-tegf-pfhh"
                        },
                        {
                            "vulnerability": "VCID-kfqh-mtw2-3feu"
                        },
                        {
                            "vulnerability": "VCID-kr13-v6jr-5kg6"
                        },
                        {
                            "vulnerability": "VCID-ndgh-dr9p-kqbu"
                        },
                        {
                            "vulnerability": "VCID-qysv-aehy-d7ay"
                        },
                        {
                            "vulnerability": "VCID-s8fu-wpk4-3ycc"
                        },
                        {
                            "vulnerability": "VCID-x1sc-wvc6-a3hz"
                        },
                        {
                            "vulnerability": "VCID-yrdb-btgm-p3cd"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-21443"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57jx-quzh-fubc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94654?format=api",
            "vulnerability_id": "VCID-9431-8f5f-rfct",
            "summary": "DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57232",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57314",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57337",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57365",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57367",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57382",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57362",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57341",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21439"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21439"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992",
                    "reference_id": "989992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
                    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-169g-wxmh-qqbw"
                        },
                        {
                            "vulnerability": "VCID-1mkr-c1ay-jygw"
                        },
                        {
                            "vulnerability": "VCID-2rbn-u9eg-sua7"
                        },
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-cqx8-tegf-pfhh"
                        },
                        {
                            "vulnerability": "VCID-kfqh-mtw2-3feu"
                        },
                        {
                            "vulnerability": "VCID-kr13-v6jr-5kg6"
                        },
                        {
                            "vulnerability": "VCID-ndgh-dr9p-kqbu"
                        },
                        {
                            "vulnerability": "VCID-qysv-aehy-d7ay"
                        },
                        {
                            "vulnerability": "VCID-s8fu-wpk4-3ycc"
                        },
                        {
                            "vulnerability": "VCID-x1sc-wvc6-a3hz"
                        },
                        {
                            "vulnerability": "VCID-yrdb-btgm-p3cd"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-21439"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9431-8f5f-rfct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94655?format=api",
            "vulnerability_id": "VCID-u3ed-wmjx-9fcq",
            "summary": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.394",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39563",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39586",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39501",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39572",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39582",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39578",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39549",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00179",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39465",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21440"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21440"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593",
                    "reference_id": "991593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991593"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
                    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-169g-wxmh-qqbw"
                        },
                        {
                            "vulnerability": "VCID-1mkr-c1ay-jygw"
                        },
                        {
                            "vulnerability": "VCID-2rbn-u9eg-sua7"
                        },
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-cqx8-tegf-pfhh"
                        },
                        {
                            "vulnerability": "VCID-kfqh-mtw2-3feu"
                        },
                        {
                            "vulnerability": "VCID-kr13-v6jr-5kg6"
                        },
                        {
                            "vulnerability": "VCID-ndgh-dr9p-kqbu"
                        },
                        {
                            "vulnerability": "VCID-qysv-aehy-d7ay"
                        },
                        {
                            "vulnerability": "VCID-s8fu-wpk4-3ycc"
                        },
                        {
                            "vulnerability": "VCID-x1sc-wvc6-a3hz"
                        },
                        {
                            "vulnerability": "VCID-yrdb-btgm-p3cd"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-21440"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u3ed-wmjx-9fcq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94656?format=api",
            "vulnerability_id": "VCID-u8xm-v9ek-yuar",
            "summary": "There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52823",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5285",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52876",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52844",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52895",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52889",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52939",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52923",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52907",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52944",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52951",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52934",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-21441"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21441"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992",
                    "reference_id": "989992",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989992"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943987?format=api",
                    "purl": "pkg:deb/debian/znuny@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943986?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.1-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-169g-wxmh-qqbw"
                        },
                        {
                            "vulnerability": "VCID-1mkr-c1ay-jygw"
                        },
                        {
                            "vulnerability": "VCID-2rbn-u9eg-sua7"
                        },
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-cqx8-tegf-pfhh"
                        },
                        {
                            "vulnerability": "VCID-kfqh-mtw2-3feu"
                        },
                        {
                            "vulnerability": "VCID-kr13-v6jr-5kg6"
                        },
                        {
                            "vulnerability": "VCID-ndgh-dr9p-kqbu"
                        },
                        {
                            "vulnerability": "VCID-qysv-aehy-d7ay"
                        },
                        {
                            "vulnerability": "VCID-s8fu-wpk4-3ycc"
                        },
                        {
                            "vulnerability": "VCID-x1sc-wvc6-a3hz"
                        },
                        {
                            "vulnerability": "VCID-yrdb-btgm-p3cd"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943989?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.15-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sdd-c9p8-3fac"
                        },
                        {
                            "vulnerability": "VCID-zd8d-c1nk-g7a4"
                        },
                        {
                            "vulnerability": "VCID-zhfb-ajkc-5uc4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.15-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/943988?format=api",
                    "purl": "pkg:deb/debian/znuny@6.5.19-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@6.5.19-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-21441"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8xm-v9ek-yuar"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/znuny@0%3Fdistro=trixie"
}