Lookup for vulnerable packages by Package URL.

GET /api/packages/99428?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/99428?format=api",
    "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8?arch=5",
    "type": "rpm",
    "namespace": "redhat",
    "name": "redhat-virtualization-host",
    "version": "4.4.10-202202081536_8",
    "qualifiers": {
        "arch": "5"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79828?format=api",
            "vulnerability_id": "VCID-45du-dgkd-p3b8",
            "summary": "kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05306",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05347",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05378",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05387",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0542",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05443",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05416",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05403",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05345",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0551",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05547",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05584",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05585",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4155"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813",
                    "reference_id": "2034813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0176",
                    "reference_id": "RHSA-2022:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0176"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0186",
                    "reference_id": "RHSA-2022:0186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0187",
                    "reference_id": "RHSA-2022:0187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0187"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0188",
                    "reference_id": "RHSA-2022:0188",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0231",
                    "reference_id": "RHSA-2022:0231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0232",
                    "reference_id": "RHSA-2022:0232",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0232"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0335",
                    "reference_id": "RHSA-2022:0335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0335"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0344",
                    "reference_id": "RHSA-2022:0344",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0344"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0529",
                    "reference_id": "RHSA-2022:0529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0529"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0530",
                    "reference_id": "RHSA-2022:0530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0530"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0531",
                    "reference_id": "RHSA-2022:0531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0531"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0533",
                    "reference_id": "RHSA-2022:0533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540",
                    "reference_id": "RHSA-2022:0540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0540"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0590",
                    "reference_id": "RHSA-2022:0590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0592",
                    "reference_id": "RHSA-2022:0592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0620",
                    "reference_id": "RHSA-2022:0620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0620"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0622",
                    "reference_id": "RHSA-2022:0622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0622"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0629",
                    "reference_id": "RHSA-2022:0629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0629"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0636",
                    "reference_id": "RHSA-2022:0636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0636"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0712",
                    "reference_id": "RHSA-2022:0712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0712"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0718",
                    "reference_id": "RHSA-2022:0718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0718"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0958",
                    "reference_id": "RHSA-2022:0958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0958"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263",
                    "reference_id": "RHSA-2022:1263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1417",
                    "reference_id": "RHSA-2022:1417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1417"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5278-1/",
                    "reference_id": "USN-5278-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5278-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5294-1/",
                    "reference_id": "USN-5294-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5294-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5294-2/",
                    "reference_id": "USN-5294-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5294-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5295-1/",
                    "reference_id": "USN-5295-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5295-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5295-2/",
                    "reference_id": "USN-5295-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5295-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5297-1/",
                    "reference_id": "USN-5297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5298-1/",
                    "reference_id": "USN-5298-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5298-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5362-1/",
                    "reference_id": "USN-5362-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5362-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5884-1/",
                    "reference_id": "USN-5884-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5884-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5926-1/",
                    "reference_id": "USN-5926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5926-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-4155"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45du-dgkd-p3b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79747?format=api",
            "vulnerability_id": "VCID-rbaq-2dap-y7bt",
            "summary": "kernel: fs_context: heap overflow in legacy parameter handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82851",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82834",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84229",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8422",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84232",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84252",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84251",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84626",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84579",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02261",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84582",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85598",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85609",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86279",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0185"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358",
                    "reference_id": "2040358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040358"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/01/18/7",
                    "reference_id": "7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/01/18/7"
                },
                {
                    "reference_url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185",
                    "reference_id": "CVE-2022-0185",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"
                        }
                    ],
                    "url": "https://github.com/Crusaders-of-Rust/CVE-2022-0185"
                },
                {
                    "reference_url": "https://www.willsroot.io/2022/01/cve-2022-0185.html",
                    "reference_id": "cve-2022-0185.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"
                        }
                    ],
                    "url": "https://www.willsroot.io/2022/01/cve-2022-0185.html"
                },
                {
                    "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2",
                    "reference_id": "?id=722d94847de2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"
                        }
                    ],
                    "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220225-0003/",
                    "reference_id": "ntap-20220225-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-22T12:49:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220225-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0176",
                    "reference_id": "RHSA-2022:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0176"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0186",
                    "reference_id": "RHSA-2022:0186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0187",
                    "reference_id": "RHSA-2022:0187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0187"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0188",
                    "reference_id": "RHSA-2022:0188",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0188"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0231",
                    "reference_id": "RHSA-2022:0231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0232",
                    "reference_id": "RHSA-2022:0232",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0232"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540",
                    "reference_id": "RHSA-2022:0540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0540"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5240-1/",
                    "reference_id": "USN-5240-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5240-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5362-1/",
                    "reference_id": "USN-5362-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5362-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2022-0185"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rbaq-2dap-y7bt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31862?format=api",
            "vulnerability_id": "VCID-y5u5-dgk3-u3da",
            "summary": "A vulnerability has been found in AIDE which can lead to root privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11285",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11425",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11484",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11272",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11354",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11412",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11419",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11216",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11347",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11288",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11248",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11187",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489",
                    "reference_id": "2041489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041489"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202311-07",
                    "reference_id": "GLSA-202311-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202311-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0440",
                    "reference_id": "RHSA-2022:0440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0441",
                    "reference_id": "RHSA-2022:0441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0441"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0456",
                    "reference_id": "RHSA-2022:0456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0456"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0464",
                    "reference_id": "RHSA-2022:0464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0472",
                    "reference_id": "RHSA-2022:0472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0472"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0473",
                    "reference_id": "RHSA-2022:0473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0473"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540",
                    "reference_id": "RHSA-2022:0540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0540"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263",
                    "reference_id": "RHSA-2022:1263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1263"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5243-1/",
                    "reference_id": "USN-5243-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5243-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5243-2/",
                    "reference_id": "USN-5243-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5243-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-45417"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47906?format=api",
            "vulnerability_id": "VCID-yee7-fp2m-r7eg",
            "summary": "A vulnerability in polkit could lead to local root privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4034.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.87811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99477",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.87811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99474",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.8794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99476",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.8794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99475",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.8794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99473",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.8794",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99478",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.88057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99488",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.88083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99488",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.88472",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99495",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.88806",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99523",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869",
                    "reference_id": "2025869",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
                },
                {
                    "reference_url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
                    "reference_id": "a2bf5c9c83b6ae46cbd5c779d3055bff81ded683",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-2",
                    "reference_id": "ASA-202204-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-2"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2654",
                    "reference_id": "AVG-2654",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2654"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt",
                    "reference_id": "CVE-2021-4034",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/50689.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202201-01",
                    "reference_id": "GLSA-202201-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202201-01"
                },
                {
                    "reference_url": "https://www.suse.com/support/kb/doc/?id=000020564",
                    "reference_id": "?id=000020564",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://www.suse.com/support/kb/doc/?id=000020564"
                },
                {
                    "reference_url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/",
                    "reference_id": "local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html",
                    "reference_id": "Polkit-pkexec-Local-Privilege-Escalation.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html",
                    "reference_id": "Polkit-pkexec-Privilege-Escalation.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
                },
                {
                    "reference_url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt",
                    "reference_id": "pwnkit.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0265",
                    "reference_id": "RHSA-2022:0265",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0265"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0266",
                    "reference_id": "RHSA-2022:0266",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0266"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0267",
                    "reference_id": "RHSA-2022:0267",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0267"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0268",
                    "reference_id": "RHSA-2022:0268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0269",
                    "reference_id": "RHSA-2022:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0270",
                    "reference_id": "RHSA-2022:0270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0270"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0271",
                    "reference_id": "RHSA-2022:0271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0272",
                    "reference_id": "RHSA-2022:0272",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0272"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0273",
                    "reference_id": "RHSA-2022:0273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0273"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0274",
                    "reference_id": "RHSA-2022:0274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0274"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0443",
                    "reference_id": "RHSA-2022:0443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0443"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0540",
                    "reference_id": "RHSA-2022:0540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0540"
                },
                {
                    "reference_url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001",
                    "reference_id": "RHSB-2022-001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf",
                    "reference_id": "ssa-330556.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
                },
                {
                    "reference_url": "https://www.starwindsoftware.com/security/sw-20220818-0001/",
                    "reference_id": "sw-20220818-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-12T10:21:57Z/"
                        }
                    ],
                    "url": "https://www.starwindsoftware.com/security/sw-20220818-0001/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5252-1/",
                    "reference_id": "USN-5252-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5252-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5252-2/",
                    "reference_id": "USN-5252-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5252-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-4034"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yee7-fp2m-r7eg"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8%3Farch=5"
}