Lookup for vulnerable packages by Package URL.

GET /api/packages/1036417?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1036417?format=api",
    "purl": "pkg:deb/debian/shadow@1:4.1.4.2%2Bsvn3283-2%2Bsqueeze1",
    "type": "deb",
    "namespace": "debian",
    "name": "shadow",
    "version": "1:4.1.4.2+svn3283-2+squeeze1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1:4.13+dfsg1-1+deb12u2",
    "latest_non_vulnerable_version": "1:4.13+dfsg1-1+deb12u2",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89451?format=api",
            "vulnerability_id": "VCID-2b4p-nehx-eyae",
            "summary": "coreutils: tty hijacking possible in \"su\" via TIOCSTI ioctl",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4890.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4890.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/cve-2005-4890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/security/cve/cve-2005-4890"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30466",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33226",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32923",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32834",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3286",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33304",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33336",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33169",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33212",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33246",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33185",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33176",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33203",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3302",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33003",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32927",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32815",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32884",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4890"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2005-4890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2005-4890"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/06/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/11/06/8"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/05/20/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/05/20/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/11/28/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/11/28/10"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2013/11/29/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2013/11/29/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/20/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/10/20/9"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/21/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/10/21/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2014/12/15/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2014/12/15/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/25/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/25/6"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843",
                    "reference_id": "628843",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657784",
                    "reference_id": "657784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657784"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=710208",
                    "reference_id": "710208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710208"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4890",
                    "reference_id": "CVE-2005-4890",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4890"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036418?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-a5ny-vcsw-uqh1"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-mp2r-dfng-27ew"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        },
                        {
                            "vulnerability": "VCID-ueu4-n6bt-xfat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2005-4890"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2b4p-nehx-eyae"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60308?format=api",
            "vulnerability_id": "VCID-74yx-3zfw-w7f2",
            "summary": "A vulnerability found in Shadow may allow local attackers to bypass\n    security restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7169.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7169.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36892",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36986",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36901",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36784",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36849",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36869",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36793",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36815",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4392",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43966",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43958",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4389",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43841",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43935",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43952",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47007",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47025",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47028",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4697",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546241",
                    "reference_id": "1546241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546241"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890557",
                    "reference_id": "890557",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890557"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201805-09",
                    "reference_id": "GLSA-201805-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201805-09"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5254-1/",
                    "reference_id": "USN-5254-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5254-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995100?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.8.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-shuq-ufcc-ruf5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.8.1-1"
                }
            ],
            "aliases": [
                "CVE-2018-7169"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74yx-3zfw-w7f2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38976?format=api",
            "vulnerability_id": "VCID-a5ny-vcsw-uqh1",
            "summary": "Multiple vulnerabilities have been found in Shadow, the worst of\n    which might allow privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19219",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19295",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19429",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19227",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19187",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19207",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19105",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19096",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19051",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18935",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19017",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19115",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1908",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19116",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19477",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19195",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19273",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19282",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038271",
                    "reference_id": "1038271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038271"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418710",
                    "reference_id": "1418710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418710"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943",
                    "reference_id": "855943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/96404",
                    "reference_id": "96404",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/96404"
                },
                {
                    "reference_url": "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891",
                    "reference_id": "dffab154d29a288aa171ff50263ecc8f2e14a891",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-3793",
                    "reference_id": "dsa-3793",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-3793"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-02",
                    "reference_id": "GLSA-201706-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201706-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0654",
                    "reference_id": "RHSA-2017:0654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0654"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0654.html",
                    "reference_id": "RHSA-2017-0654.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0654.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0907",
                    "reference_id": "RHSA-2017:0907",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0907"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616",
                    "reference_id": "show_bug.cgi?id=CVE-2017-2616",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3276-1/",
                    "reference_id": "USN-3276-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3276-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3276-3/",
                    "reference_id": "USN-3276-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3276-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036420?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.2-3%2Bdeb8u4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-a5ny-vcsw-uqh1"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        },
                        {
                            "vulnerability": "VCID-ueu4-n6bt-xfat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.2-3%252Bdeb8u4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050382?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.4-4.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.4-4.1"
                }
            ],
            "aliases": [
                "(+",
                "CVE-2017-2616",
                "fix)",
                "regression"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ny-vcsw-uqh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78345?format=api",
            "vulnerability_id": "VCID-bcx3-q456-w7ad",
            "summary": "shadow-utils: possible password leak during passwd(1) change",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4641.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4641.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03447",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03295",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03269",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03225",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03343",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03362",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.034",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03404",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03411",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03306",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03314",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03319",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03339",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03297",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03559",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03425",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03545",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03553",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03606",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4641"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051062",
                    "reference_id": "1051062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051062"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215945",
                    "reference_id": "2215945",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T18:19:24Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215945"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_id": "cpe:/a:redhat:enterprise_linux:9::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.6::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_id": "cpe:/a:redhat:rhel_eus:8.8::crb",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::crb"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_id": "cpe:/o:redhat:enterprise_linux:9::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.6::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_id": "cpe:/o:redhat:rhel_eus:8.8::baseos",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-4641",
                    "reference_id": "CVE-2023-4641",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T18:19:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-4641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6632",
                    "reference_id": "RHSA-2023:6632",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T18:19:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6632"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7112",
                    "reference_id": "RHSA-2023:7112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T18:19:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0417",
                    "reference_id": "RHSA-2024:0417",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T18:19:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0417"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2577",
                    "reference_id": "RHSA-2024:2577",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-02T18:19:24Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2577"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6640-1/",
                    "reference_id": "USN-6640-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6640-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995101?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.13%2Bdfsg1-1%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.13%252Bdfsg1-1%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-4641"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcx3-q456-w7ad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93196?format=api",
            "vulnerability_id": "VCID-cabd-74q6-kug2",
            "summary": "The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-20002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16147",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1633",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16391",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1619",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16276",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1634",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16321",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16282",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16214",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16151",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16168",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16206",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16096",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16093",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16054",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15936",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16049",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16153",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16128",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16162",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16236",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-20002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20002"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957",
                    "reference_id": "914957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914957"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050383?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.5-1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.5-1.1"
                }
            ],
            "aliases": [
                "CVE-2017-20002"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cabd-74q6-kug2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78511?format=api",
            "vulnerability_id": "VCID-m3za-mkkw-p7e2",
            "summary": "shadow: Improper input validation in shadow-utils package utility chfn",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29383.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29383.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06977",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07082",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07031",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07011",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07066",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07104",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07092",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00028",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07911",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08592",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08745",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08756",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0871",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00031",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08715",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16023",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.161",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16134",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16208",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15909",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16125",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29383"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29383",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29383"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034482",
                    "reference_id": "1034482",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034482"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187184",
                    "reference_id": "2187184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187184"
                },
                {
                    "reference_url": "https://github.com/shadow-maint/shadow/pull/687",
                    "reference_id": "687",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T21:21:27Z/"
                        }
                    ],
                    "url": "https://github.com/shadow-maint/shadow/pull/687"
                },
                {
                    "reference_url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/",
                    "reference_id": "cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T21:21:27Z/"
                        }
                    ],
                    "url": "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/"
                },
                {
                    "reference_url": "https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d",
                    "reference_id": "e5905c4b84d4fb90aefcd96ee618411ebfac663d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T21:21:27Z/"
                        }
                    ],
                    "url": "https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d"
                },
                {
                    "reference_url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797",
                    "reference_id": "?fid=31797",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-06T21:21:27Z/"
                        }
                    ],
                    "url": "https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995101?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.13%2Bdfsg1-1%2Bdeb12u2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.13%252Bdfsg1-1%252Bdeb12u2"
                }
            ],
            "aliases": [
                "CVE-2023-29383"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3za-mkkw-p7e2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56592?format=api",
            "vulnerability_id": "VCID-m4sf-znhe-gubc",
            "summary": "A vulnerability found in Shadow may allow remote attackers to cause\n    a Denial of Service condition or produce other unspecified behaviors.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12424.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12424.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69172",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69028",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69008",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69059",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69066",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69072",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69054",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69096",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69128",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6912",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69007",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68978",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70293",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7036",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70384",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70306",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70323",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.703",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00633",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70345",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12424"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478359",
                    "reference_id": "1478359",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478359"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630",
                    "reference_id": "756630",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201710-16",
                    "reference_id": "GLSA-201710-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201710-16"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5254-1/",
                    "reference_id": "USN-5254-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5254-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050383?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.5-1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.5-1.1"
                }
            ],
            "aliases": [
                "CVE-2017-12424"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m4sf-znhe-gubc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85905?format=api",
            "vulnerability_id": "VCID-mp2r-dfng-27ew",
            "summary": "regression update",
            "references": [],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036420?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.2-3%2Bdeb8u4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-a5ny-vcsw-uqh1"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        },
                        {
                            "vulnerability": "VCID-ueu4-n6bt-xfat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.2-3%252Bdeb8u4"
                }
            ],
            "aliases": [
                "DSA-3793-2 shadow"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mp2r-dfng-27ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30934?format=api",
            "vulnerability_id": "VCID-r9a4-2dw5-4bgq",
            "summary": "Multiple Shadow utilities were installed with setuid permissions,\n    allowing possible root privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19882.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19882.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26202",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26282",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26324",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26096",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26163",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26211",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2622",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26174",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26115",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26119",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2606",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25999",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25995",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25946",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25837",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25897",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25952",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25879",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25896",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25974",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19882"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788452",
                    "reference_id": "1788452",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1788452"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201912-4",
                    "reference_id": "ASA-201912-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201912-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1079",
                    "reference_id": "AVG-1079",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1079"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202008-09",
                    "reference_id": "GLSA-202008-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202008-09"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/995100?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.8.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-shuq-ufcc-ruf5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.8.1-1"
                }
            ],
            "aliases": [
                "CVE-2019-19882"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9a4-2dw5-4bgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38974?format=api",
            "vulnerability_id": "VCID-ueu4-n6bt-xfat",
            "summary": "Multiple vulnerabilities have been found in Shadow, the worst of\n    which might allow privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28229",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27753",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2766",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27675",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28299",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28343",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28134",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.282",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28243",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28206",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28161",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28142",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28099",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28016",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27904",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27827",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27656",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27718",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2774",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358625",
                    "reference_id": "1358625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358625"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832170",
                    "reference_id": "832170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832170"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-02",
                    "reference_id": "GLSA-201706-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3276-1/",
                    "reference_id": "USN-3276-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3276-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036420?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.2-3%2Bdeb8u4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-a5ny-vcsw-uqh1"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        },
                        {
                            "vulnerability": "VCID-ueu4-n6bt-xfat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.2-3%252Bdeb8u4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050382?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.4-4.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.4-4.1"
                }
            ],
            "aliases": [
                "CVE-2016-6252"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ueu4-n6bt-xfat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33179?format=api",
            "vulnerability_id": "VCID-zbq9-jt94-ckhd",
            "summary": "This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2012. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.",
            "references": [
                {
                    "reference_url": "http://osvdb.org/70895",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/70895"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80781",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80532",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80539",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80561",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80553",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80592",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80617",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80619",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80623",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80647",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80651",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80666",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80684",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80705",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80725",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8072",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0142",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80738",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-0721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0721"
                },
                {
                    "reference_url": "http://secunia.com/advisories/42505",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/42505"
                },
                {
                    "reference_url": "http://secunia.com/advisories/43345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/43345"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65564"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.380014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.380014"
                },
                {
                    "reference_url": "http://www.debian.org/security/2011/dsa-2164",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2011/dsa-2164"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/46426",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/46426"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1065-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1065-1"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0396",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0396"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0398"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0773"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=678897",
                    "reference_id": "678897",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678897"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:shadow:1\\:4.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:debian:shadow:1\\:4.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:shadow:1\\:4.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0721",
                    "reference_id": "CVE-2011-0721",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0721"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201412-09",
                    "reference_id": "GLSA-201412-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201412-09"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1065-1/",
                    "reference_id": "USN-1065-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1065-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036418?format=api",
                    "purl": "pkg:deb/debian/shadow@1:4.1.5.1-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74yx-3zfw-w7f2"
                        },
                        {
                            "vulnerability": "VCID-a5ny-vcsw-uqh1"
                        },
                        {
                            "vulnerability": "VCID-bcx3-q456-w7ad"
                        },
                        {
                            "vulnerability": "VCID-cabd-74q6-kug2"
                        },
                        {
                            "vulnerability": "VCID-m3za-mkkw-p7e2"
                        },
                        {
                            "vulnerability": "VCID-m4sf-znhe-gubc"
                        },
                        {
                            "vulnerability": "VCID-mp2r-dfng-27ew"
                        },
                        {
                            "vulnerability": "VCID-r9a4-2dw5-4bgq"
                        },
                        {
                            "vulnerability": "VCID-ueu4-n6bt-xfat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.1.5.1-1"
                }
            ],
            "aliases": [
                "CVE-2011-0721"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbq9-jt94-ckhd"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/shadow@1:4.1.4.2%252Bsvn3283-2%252Bsqueeze1"
}